Going to an office and look under the computer keyboards and in the end there is a small piece of paper on which the login ID and password. Probably everyone has forgotten the person.
This shows a serious problem with the use of networked computers to the economy. User apathy and arrogance, information security is often combined with the aim of defeating the security policies established.
What happens is that IT security policies clash with usability.Most customers do not follow the policy, were too difficult. A place is IT policies and compliance of users at the time of the collision transfer to a secure computer system. The login screen.
Let us first agree on a definition of a strong password.
From Webopedia, a password that is difficult to recognize the human data and computer programs, effectively protect against unauthorized access. A strong password consists of at least six characters (and characters rather thanThe stronger the password) that a combination of letters, numbers and symbols (@, #, $,%, etc.) are admissible. Passwords are usually case-sensitive, so a strong password contains letters in uppercase and lowercase letters. Strong passwords do not contain the words found in a dictionary or any part of the name.
Customers do not have the passwords difficult. Sorry, just will not! For example, you have two passwords: 1XC% & 27m3 and parrott5. What is the strongest? WhichContinue to use your customers?
The key is education. End users should be educated to the seriousness of computer security and IT security professionals should be aware of the needs of its user base.
You should avoid passwords sequential parrott1, parrott2, parrott3 ... You should use a password that is easy to remember, but not the use of a dictionary. Maybe combine parts of two words with capital letters and numbers.
IT SecurityProfessionals may not like this compromise, but it is better than passwords that are easily broken.
Strong passwords are for the security of computer security, but they are the best way to control access? In the second part we will do our alternatives to passwords.
ไม่มีความคิดเห็น:
แสดงความคิดเห็น