The Wrong Way To Keep List Of Passwords Case Study

PAGES
3
WORDS
860
Cite

¶ … Email Spreadsheet Dear Mr. Rocco,

After conducting a review of some of your systems and files, I came across something that you should be aware of. In one of the share folders that is amongst your networks drives and storage, a file that contains the emails and passwords of your staff was present in the form of a spreadsheet with no apparent security measures present. This is unwise and needs to be changed for a number of reasons, and they are as follows:

• Having such a file present in an insecure area makes the file and its information potentially available for anyone that happens to find it. This is obviously something that cannot be allowed

• Even if the file was only available for the IT staff that is doing password changes and the like, not even they should have direct and unfettered access to that information. They should indeed be able to verify identity and reset password information. However, the IT users themselves should not have access to that information because there is no need for them to have it themselves and the IT staff could, in theory, use the username and password information to do things in the name of other people without detection....

...

Generally speaking, the only person that should have access to a certain account and its password is that person, without exceptions for the most part.
• A middle ground that could be used is to have a default reset password that people use and then the person whose password is being reset must be changed right away.

• Regardless of the system and procedure that is used, the passwords should never be in a share or a file that is completely secure and all of the personnel should be using the eact same procedure and systems to do password resets. It should be available to the IT staff and other authorized personnel and that is it.

• One consideration that should be kept in mind when it comes to a unified and secure solution is access to whatever solution and procedure is in question when the IT staff is away from the office. That is apparently at least part of the problem that must be dealt with.

• Once a revised solution is decided upon, absolutely everyone should be required to update their password, whether they are currently on the sheet or not.

• The users who have been using that spreadsheet must be made to agree…

Sources Used in Documents:

References

Devil's Blog. (2017). LDAP Enumeration. Nrupentheking.blogspot.com. Retrieved 28 May 2017, from https://nrupentheking.blogspot.com/2011/02/ldap-enumeration.html

Orrey, K. (2017). VulnerabilityAssessment.co.uk. Vulnerabilityassessment.co.uk. Retrieved 28 May 2017, from http://www.vulnerabilityassessment.co.uk/ldapminer.htm

SourceForge. (2017). LdapMiner. SourceForge. Retrieved 28 May 2017, from https://sourceforge.net/projects/ldapminer/


Cite this Document:

"The Wrong Way To Keep List Of Passwords" (2017, May 28) Retrieved April 28, 2024, from
https://www.paperdue.com/essay/the-wrong-way-to-keep-list-of-passwords-2165091

"The Wrong Way To Keep List Of Passwords" 28 May 2017. Web.28 April. 2024. <
https://www.paperdue.com/essay/the-wrong-way-to-keep-list-of-passwords-2165091>

"The Wrong Way To Keep List Of Passwords", 28 May 2017, Accessed.28 April. 2024,
https://www.paperdue.com/essay/the-wrong-way-to-keep-list-of-passwords-2165091

Related Documents

Jewish Identity in Modern Times: Jonathan Sacks, in an article Love, Hate and Jewish Identity appropriately sums up the dilemma of Jewish self-identity in modern times by stating: "Until the beginning of the 19th century, Jews defined themselves as the people loved by God. Since then most Jews...have defined themselves as the people hated by Gentiles." This is probably because in pre-modern times, the Jewish child felt no significant 'identity

Management Every person that has worked for a company with poor management -- where a lack of communication or a failure to motivate employees is the norm rather than the exception -- can benefit from the readings in this assignment. There are quality companies where employees are encouraged and treated as valuable assets, and then there are companies that rely on threats of punishment and intimidation to get the most out

Espionage Study Guide
PAGES 34 WORDS 9330

Espionage Burds, Chapter 19 Golden Age of Soviet "Illegals" Cambridge Five: Burgess, Blunt, Maclean, Philby and Cairncross These five were all discovered to be spying for the Soviets. Cairncross was never caught. He supplied Stalin with secrets that helped the Soviets stay ahead of British Intelligence, especially at the Battle of Kursk Cairncross also informed Stalin of ULTRA, when Churchill was hiding ULTRA from Stalin Cairncross supplied a total of 5832 documents to the Soviets Cairncros had been

Again, people find a difference between intrusion by the government and by the private companies. In U.S., there are very few restrictions on private companies than on the government about collecting data about individuals. This is because activities like buying of books, getting a video, seeing a movie in theatres or eating in restaurants have been viewed as public activities of individuals. These are essentially not bothered with by laws

Firewalls Once upon a time a firewall was a physical barrier that kept a literal fire from spreading from one building to another. Now the term is more often used to refer to a variety of devices - both hardware and software - meant to keep information from being stolen from a computer. This paper examines the variety of commercial firewalls that are available today. Initially firewalls were separate pieces of hardware;

Clinical Problem of Interest Anabolic Steroids and Their Effects on the Body Even though governing bodies and media reports may have a person thinking otherwise, the use of anabolic steroids by athletes is nothing new or unique. The use of these drugs has been going on for some time throughout many different kinds of sports, and there is no reason to think that it will stop, despite the illegality of it and