MyLab MIS with Pearson eText -- Access Card -- for Using MIS
MyLab MIS with Pearson eText -- Access Card -- for Using MIS
10th Edition
ISBN: 9780134658933
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
bartleby

Concept explainers

Expert Solution & Answer
Book Icon
Chapter 1.7, Problem 1SGDQ

Explanation of Solution

Password:

Sensitive information is present in every system or network and it requires authentication to open.

  • The authorization is provided by entering the password, identification number, and so on.
  • Password can be a string of character or number and it protects the system from the access of the unauthorized person.

Rule for creating a password:

The rules for creating password are:

  • Password should be changed often.
  • Password should not be guessable such as first name, last name and so on.
  • The length of the password should be minimum 8 characters or more in length.
  • It is good, if it has uppercase letters, lowercase letters, numbers, and special characters.
  • It should not be a familiar word or pharse.
  • It should not be common numbers like birth date and social security number.
  • Password should not be shared with others.

Example of Weak password:

The examples of weak password are “FirstName_123”, “mypassword”, “mobile_number” and “123456789”.

Example of strong password:

The password with the combination of uppercase letters, lowercase letters, numbers, and special characters are considered as strong password.

Password Creation using the lines -“Tomorrow and tomorrow and tomorrow, creeps in its petty pace...

Blurred answer
Students have asked these similar questions
Could you please describe the idea of a challenge-and-response authentication system to me in your own words so that I can fully grasp it? (CRAS). What about this technique of authentication is more secure than using a password?
Provide a made-up example of how you'd handle the administration of user accounts. Create a long list of all the various forms of authentication there are. Is it possible that passwords may become obsolete in the near future?
Provide a brief explanation of the challenge-and-response authentication system idea. What makes this technique of authentication so much better if passwords are so insecure?
Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning