Please enable JavaScript.
Coggle requires JavaScript to display documents.
2.3 hackers and attacker (Two basic area of policy (the policy should…
2.3 hackers and attacker
Two basic area of policy
- the policy should identify the assets that required protection.this helps the designer provide the correct level of protection for sensitive computing resources and to identify the flow of sensitives data in the network
- should identify possible attackers.this give assigned to internal and external users,ideally identified by more specific categories such as business partners customer ofan organization and outsourcing IT partners
password policy
-
weak password
-
- contain your username ,real name,orcompanyname
- contain a complete dictionary word:ex: PASSWORD,passw0rd,pa$$word