Preview

Security Policy – Research Paper

Powerful Essays
Open Document
Open Document
2513 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security Policy – Research Paper
`

PASSWORD POLICIES
Security Policy – Research Paper
MADDULA SAIMOHAN Student number: 3699961 Email: sm488@uow.edu.au

2010

MADDULA SAIMOHAN, STUDENT NUMBER 3699961

Abstract:
We’re secure! We use passwords!” How many of us have heard this claim? Or even – “We’re secure! We have a password policy!” Use a password or to calculate the world today, the password policy is not enough. To set a password in most cases the first line of defence, and much more. “A recent survey by Rainbow Technologies Inc. indicates that the use of insecure passwords can be costly -- and potentially risky -- for corporate data.”[Rosencrance] This paper focuses on the use of passwords and password policy good aspects and bad aspects, set of defined passwords according to password polices scenario that arise

Keywords:

Passwords, system security, threat assessment, company policy, university policy

Table of Contents Abstract: ..................................................................................................................... 2 Keywords: .................................................................................................................. 2 Introduction: ............................................................................................................... 3 Password policy good aspects: .................................................................................. 3 Password policy bad aspects: .................................................................................... 4 Key recommendation: ................................................................................................ 6 Conclusion: ................................................................................................................ 6 References: ................................................................................................................ 7

2

MADDULA SAIMOHAN, STUDENT NUMBER 3699961

Introduction:
In today 's



References: 1. Armstrong, I. (2003). “Passwords exposed users are the weakest link”. Scmagazine. June 2003. Accessed as on 21 August http://www.scmagazine.com/scmagazine/2003_06/cover/index.html 2. 3. Bishop, M. (2003). Computer Security. Art and Science. Addison Wesley. David C. Feldmeier and Philip R. Karn Accessed as on 10 September 2010 http://www.springerlink.com/content/ljy0753m9gwwkd6d/ 4. 5. Fisher, D. (2003). “Worms Prove Passwords Do Matter”. eWeek. March 11, 2003. Hitachi ID Systems Inc. (2009). Password Management Best Practices. Accessed as on 10 September 2010 http://www.psynch.com/docs/password-management-best-practices.pdf 6. Information Systems Audit and Control Association (ISACA) (2009). Certified Information Accessed as on 10 September 2010 7. 8. 9. Systems Auditor (CISA) Review Manual 2009. ISACA: Rolling Meadows, IL. Rosencrance, L. (2003). “Survey: Insecure passwords can be costly for companies,” Computer World. McDowell, M, Rafail, J, and Hernan J. (2004).Choosing and Protecting Passwords. Carnegie Mellon University. Accessed as on 10 September 2010 http://cns.esf.edu/Sec_Rec/PW_rec1.htm 10. Wagner, R. (2003). “Windows Password Weaknesses Could Threaten Your Enterprise,” Gartner First Take. Accessed as on 10 September 2010 http://www.gartner.com/resources/116500/116510/116510.pdf 7

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    You must demonstrate the various methods for using the runas utility to allow administrators to reduce the exposure of administrative accounts.…

    • 322 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Information Technology is advancing and growing by the minute. Without encryption, credentials sent can be easily intercepted and read by hackers, causing "irreparable damage" to the user and the website owner 's reputation (Eugene Teo, senior manager of security response at security software firm Symantec Singapore, 2014). Security will include monitoring internet behavior, login and log on password rules, software update, and privacy of information.…

    • 688 Words
    • 3 Pages
    Good Essays
  • Good Essays

    BSA 375 Week 3 Individual

    • 793 Words
    • 3 Pages

    The level of security and its effectiveness in an application is a concern for all software development projects. Operations and Information Technology will hold key responsibility in implementation and maintenance of the software security measures. These measures will include but not be limited to firewalls, intrusion detection systems, credential verification, and standard backup operations (Valacich, 2012). This responsibility isn’t limited to just these measures or to this scope of responsibility. All hands that take part in development will have some responsibility in assuring appropriate security measures are developed, implemented, and maintained.…

    • 793 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Sunica Music

    • 697 Words
    • 3 Pages

    As relates to your selected scenario, give a brief 100- to 200-word overview of the company.…

    • 697 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT 2580 Introduction To Information Security Teacher : Mr. Timothy Tacker Unit 10 Assignment 1 Examine Real-World Applications of Security Standards ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++…

    • 493 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    For the recommendations on the tiered architecture I suggest three-tier architecture. This architecture is the most common. It consists of three tiers; a presentation tier, a logic tier, and a data tier…

    • 429 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    In the user domain, one of the easiest ways for the system to be compromised is through the users. Easiness of user’s passwords can be a major problem so we need to implement complex passwords including eight or more characters, both upper and lower case, and use of at least one special character. Passwords will need to be changed every three months and the same password cannot be used again for one calendar year.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This paperwork of IT 244 Week 1 Individual Introduction to the Information Security Policy Appendix C comprises:…

    • 396 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Consider the various amounts of social media sites and email accounts, along with the millions of passwords that are used to access these sites. Society continues to crave more social media interactions and email accounts but yet there is not a cohesive effort to secure the passwords that are used for these sites. In a recent article by SC Magazine, it reported the compromise of over two million accounts. The goal of this evaluation will be to reference numerous aspects of this security article, describe each aspect, with comments on its usefulness…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Note. The Week Two assignment has been identified as a tool to assist in the university’s Programmatic Assessment Project. As such, completed student assignments may be periodically sampled for program analysis purposes. To assist in maintaining the integrity of the data collected, do not change the content of this assignment. Please delete this note before submitting to students.…

    • 627 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Access Control Policy

    • 833 Words
    • 3 Pages

    Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems…

    • 833 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    different organs that address security issues both within and outside the borders. The United States of America has different security organs that deal with different security issues. The Department of Homeland Security is one organ of security in America. This department deals with threats against the country that range from border control, aviation security, cyber security and emergency response. In emergency response, the department comes up with various courses of action that help in emergency situations a process called emergency management. Emergency management is an action plan that is formulated to mitigate hazards, control disaster, ensure recovery process goes smoothly and follow up on recovery. These roles of the Department of Homeland…

    • 1865 Words
    • 8 Pages
    Good Essays
  • Powerful Essays

    Safeguarding Policy Report

    • 3305 Words
    • 14 Pages

    Professional roles Safeguarding Policy Report. The purpose of this assignment is to give a report exploring the development of a chosen policy. The policy I will be given my report on is the safeguarding policy. I will examine, analyse and provide an overview of how this system works in practice in relation to the overall safety of the children within the setting.…

    • 3305 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Related Literature

    • 311 Words
    • 2 Pages

    This chapter discusses the literature and studies which are related and have direct bearing to the proposed study. It consists of referenced information about information system, Sales Monitoring and Inventory System, scripting and programming languages, database, online application and web authentication security. And will also discuss the synthesis of the proposed study.…

    • 311 Words
    • 2 Pages
    Good Essays

Related Topics