Please enable JavaScript.
Coggle requires JavaScript to display documents.
CHAPTER 2 : SECURITY POLICIES AND PROCEDURES, ., . - Coggle Diagram
CHAPTER 2 : SECURITY POLICIES AND PROCEDURES
1.Usernames and password.
1..A username and password are two pieces of information that a user needs to log on to a computer.
2.When an attacker knows one of these entries, the attacker needs only to crack or discover the other entry to gain access to the computer system.
3.Password guidelines are an important component of a security policy.
4.Any user that must log on to a computer or connect to a network resource should be required to have a password.
5.Using secure, encrypted login information for computers with network access should be a minimum requirement in any organization.
6.Malicious software could monitor the network and record plaintext passwords. If passwords are encrypted, attackers must decode the encryption to learn the passwords
7.Attackers can gain access to unprotected computer data.
9.Password protection can prevent unauthorized access to content.All computers should be password protected.
Level of password protection
=Three levels of password protection are recommended:
(i.)BIOS - Prevents the operating system from booting and the BIOS settings from being changed without the appropriate password.
(ii.)Login - Prevents unauthorized access to the local computer.
(iii.)Network - Prevents access to network resources by unauthorized personnel.
3.Guideline to create strong passwords
=These are some guidelines to creating strong passwords:
(i.)Length - Use at least eight characters.
(ii.)Complexity - Include letters, numbers, symbols, and punctuation. Use a variety of keys on the keyboard, not just common letters and characters.
(iii.)Variation - Change passwords often. Set a reminder to change the passwords you have for email, banking, and credit card websites on the average of every three to four months.
(iv.)Variety - Use a different password for each site or computer that you use.
.
.