Essay Available:
You are here: Home → Essay → IT & Computer Science
Pages:
2 pages/≈550 words
Sources:
3 Sources
Level:
APA
Subject:
IT & Computer Science
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 10.8
Topic:
Explain the Concept of Password Policy Enforcement IN Organizations (Essay Sample)
Instructions:
the essay Explains the Concept of Password Policy Enforcement IN organizations
source..Content:
Password Policy Enforcement
Students Name
Institutional Affiliation
The world of technology has exhibited great changes and among them is the fact that many organizations have made the use of passwords the most common way to secure their data. However, the use of passwords has also been proven to be a weak and unsafe way of securing important information due to the existence of hackers. Therefore, every organization ought to understand the Operating System that they use and the best process for implementing its passwords policy. In this case, the process of enforcing a password policy will be carried out on Windows.
The first process of enforcing a password policy is by identifying the default password setting of Windows for the purpose of changing them to fit the organization’s password requirement. Among the default setting of the operating system is to have passwords of a certain length. Passwords that contain a few characters are prone to easy hacking and. Therefore, the settings in this part will be made only to accept a certain minimum number of characters for passwords. In turn, this will ensure that the passwords are strong enough such that they can’t be hacked. Therefore, an employee will only be able to create passwords of a certain minimum length (Microsoft, 2015).
As well, the default settings on the history part will be changed to ensure that employees do not change their password to one that they have used before. Instead, employees will only be able to set new passwords. Besides, the complexity settings of the password should be customized to commands that require the password to contain letters, numbers, uppercase and lowercase initials to make it hard for hackers to guess the passwords
Besides, the other settings to consider will be changing the default password setting of Windows such that the employees of that organization can only use passwords to a specified maximum and minimum periods. The employees should not be able to change their passwords unless it is possible as per the defined commands. As well, when the maximum period is arrived at, employees will not be able to log into their systems not unless they change their passwords. As a result, this will make it hard for hackers to guess the passwords of individual accounts. (Saluste, 2014).
To ensure maximum security when creating passwords, the default settings will be changed to allow individuals to verify their password creation with valid documents such as emails or phone numbers. In turn, this is effected by sending a verification code to one’s phone or email that the user has to confirm before creating the password. As well, such verification document should be used in a case whereby a user wishes to change their password to ensure that it’s not a hacker but the same person who is trying to change their password. The default settings on the Windows will also be customized to ensure that individuals cannot create a password that matches their user name (Kiefer & Manulis, 2014).
...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
Other Topics:
- Discuss The Ethical Implications Of Lethal Cyber WeaponsDescription: Most of today's headlines are dominated by the use and misuse of information and communication technology. ...5 pages/≈1375 words| 9 Sources | APA | IT & Computer Science | Essay |
- Characteristics of Cloud ComputingDescription: Cloud computing is the access to information technology resources and applications through the pay as you go services. The services provided are Platform as a service, infrastructure as a service and software as a service (Rainer, 2011). Characteristics Cloud computing On- demand self-service provide ...2 pages/≈550 words| 4 Sources | APA | IT & Computer Science | Essay |
- Importance Of Computer Program Financial Planning In Our Advent GenerationDescription: At the advent generation where the computer has become the order of most operation, planning techniques continue to advance...6 pages/≈1650 words| 6 Sources | APA | IT & Computer Science | Essay |