Using MIS (10th Edition)
Using MIS (10th Edition)
10th Edition
ISBN: 9780134606996
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
bartleby

Concept explainers

Question
Book Icon
Chapter 1.7, Problem 3SGDQ
Program Plan Intro

Password:

Sensitive information is present in every system or network and it requires authentication to open.

  • The authorization is provided by entering the password, identification number, and so on.
  • Password can be a string of character or number and it protects the system from the access of the unauthorized person.

Rule for creating a password:

The rules for creating password are:

  • Password should be changed often.
  • Password should not be guessable such as first name, last name and so on.
  • The length of the password should be minimum 8 characters or more in length.
  • It is good, if it has uppercase letters, lowercase letters, numbers, and special characters.
  • It should not be a familiar word or pharse.
  • It should not be common numbers like birth date and social security number.
  • Password should not be shared with others.

Example of Weak password:

The examples of weak password are “FirstName_123”, “mypassword”, “mobile_number” and “123456789”.

Example of strong password:

The password with the combination of uppercase letters, lowercase letters, numbers, and special characters are considered as strong password.

Blurred answer
Students have asked these similar questions
SOLVE STEP BY STEP PLEASE THANKS! A website password is made up of 8 characters, of which at least 2 must be letters (uppercase or lowercase, assume there are 26 of each), at least 2 must be decimal digits (0 to 9) and at least 2 must be special characters (assume there are 24 special characters). In how many ways can the password be chosen if repeating characters is allowed and it is case sensitive?
Write an article outlining a made-up situation involving login administration. Write out all the ways you've been able to establish your identity. Do you think passwords will become obsolete in the near future?
Imagine a realistic setting in which user authentication is managed. Create a list of all the identifying information that has been accepted from you. What are your thoughts on the future of passwords?
Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education