Using MIS (10th Edition)
Using MIS (10th Edition)
10th Edition
ISBN: 9780134606996
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
bartleby

Concept explainers

Question
Book Icon
Chapter 1.7, Problem 3SGDQ
Program Plan Intro

Password:

Sensitive information is present in every system or network and it requires authentication to open.

  • The authorization is provided by entering the password, identification number, and so on.
  • Password can be a string of character or number and it protects the system from the access of the unauthorized person.

Rule for creating a password:

The rules for creating password are:

  • Password should be changed often.
  • Password should not be guessable such as first name, last name and so on.
  • The length of the password should be minimum 8 characters or more in length.
  • It is good, if it has uppercase letters, lowercase letters, numbers, and special characters.
  • It should not be a familiar word or pharse.
  • It should not be common numbers like birth date and social security number.
  • Password should not be shared with others.

Example of Weak password:

The examples of weak password are “FirstName_123”, “mypassword”, “mobile_number” and “123456789”.

Example of strong password:

The password with the combination of uppercase letters, lowercase letters, numbers, and special characters are considered as strong password.

Blurred answer
Students have asked these similar questions
I need to define and discuss the uses of one monitoring or troubleshooting tool in Windows Server 2019. thank you
I would likr toget help with the following concepts:  - Windows Server features - Windows Server versus Windows 10 used as a client-server network
I need to define and discuss the uses of one monitoring or troubleshooting tool in Windows Server 2019. thank you
Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning