Network Password Policies And Authorization Research Proposal

All network authorized personnel must be instructed to use "strong" passwords consisting of at least 8 characters; they must include at least one upper and one lower case letter, at least one Arabic number, and at least one "special character" in addition to avoiding any form or abbreviation of the user's first or last name (Boyce, 2002; Kizza, 2005). Network administrators must also implement applications capable of ensuring compliance by automatically rejecting improper password choices. Additionally, administrators must require authorized users to change their passwords at specific intervals. Finally, office managers must monitor compliance with common-sense rules about behavioral aspects of password security, such as prohibiting divulging passwords to co-workers, requiring users to log off if they leave their terminals, and by providing training into recognizing attempted social engineering to obtain secure information through deception (Larson, 2007).

Likewise, authentication layers...

...

In that regard, the most cost-effective elements of authentication would consist of assigned security key sequences by the network security administrators and hardware components such as fingerprint readers capable of identifying individual users by their unique fingerprints (Larson, 2007). The first authentication assurance element is not associated with any more than nominal indirect costs (represented by the time devoted by network security administrators); the second element is available at an approximate cost of $100 per computer network terminal (Larsen, 2007).

Sources Used in Documents:

References

Boyce J. (2002). Information Assurance: Managing Organizational it Risks. St. Louis,

MO: Elsevier.

Kizza JM. (2005). Computer Network Security. New York: Springer.

Larsen R. (2007). Our Own Worst Enemy: Asking the Right Questions About


Cite this Document:

"Network Password Policies And Authorization" (2010, February 15) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/network-password-policies-and-authorization-15038

"Network Password Policies And Authorization" 15 February 2010. Web.19 April. 2024. <
https://www.paperdue.com/essay/network-password-policies-and-authorization-15038>

"Network Password Policies And Authorization", 15 February 2010, Accessed.19 April. 2024,
https://www.paperdue.com/essay/network-password-policies-and-authorization-15038

Related Documents
Network Security
PAGES 4 WORDS 1437

Network Security for a Medium Sized Company: Network security is an important component for all companies including small and medium sized firms because very few businesses can operate without a network of computers. The network of computers facilitates improved communication in order for the company to improve its profitability or productivity. However, the improved communication between computers is also associated with some inherent risks such as malware and unauthorized access. The

Network Security for Vonnie's Distribution Services Objective of this project is to design network solution and security system for the Vonnie's Distribution Services. The company is considering expanding from the first floor to the third floor within the next few years and the management asks the company Chief Information Officer (CIO) to design a stable, scalable and reliable network security and infrastructure. However, justification of the relationships between security and infrastructure

Network Security
PAGES 8 WORDS 3486

Network Security History and Evolution of Network Security: The term 'Network Security' refers to the concept of the creation of a 'secure platform' based upon which the user of the computer or of a program within the computer are allowed to perform only those specific tasks that are allowed within the parameters dictated by the security network of the computer, and banned from performing those that are not allowed. The tasks include

Network Security
PAGES 10 WORDS 3307

Network Security: Past, Present and Future The work of Curtin (2007) states that a network is defined as "any set of interlinking lines resembling a net, a network of roads -- an interconnected system, a network of alliances." Quite simply a computer network is a system of computers that are interconnected. There are seven layers of communication types identified by the International Standards Organization (ISO) Open Systems Interconnect (OSI) Reference Model

Network Security: An Issue for Business Data Communication Computer security and the protection of data has been an issue since the early 1980s when computers became standard office equipment. Company sensitive information is stored on computers. Protecting the access to and integrity of this information has been a key concern for managers and computer specialists alike. The issues in data security have not changed, however the advent of the Internet has

Crete LLC’s Windows Server 2012 Network Proposal Crete LLC is a business organization that produces and distributes solar panel for the consumer market. In the past few years, the solar panel market has experienced tremendous growth because of the increased consumer demands for solar panels. Consequently, Crete LLC seeks to establish itself as a major industry player in order to meet the high demand for solar panels. Therefore, the company seeks