Security Policy – Research Paper

Only available on StudyMode
  • Topic: Password, Cryptographic hash function, User
  • Pages : 8 (2513 words )
  • Download(s) : 225
  • Published : October 8, 2010
Open Document
Text Preview
`

PASSWORD POLICIES
Security Policy – Research Paper
MADDULA SAIMOHAN Student number: 3699961 Email: sm488@uow.edu.au

2010

MADDULA SAIMOHAN, STUDENT NUMBER 3699961

Abstract:
We’re secure! We use passwords!” How many of us have heard this claim? Or even – “We’re secure! We have a password policy!” Use a password or to calculate the world today, the password policy is not enough. To set a password in most cases the first line of defence, and much more. “A recent survey by Rainbow Technologies Inc. indicates that the use of insecure passwords can be costly -- and potentially risky -- for corporate data.”[Rosencrance] This paper focuses on the use of passwords and password policy good aspects and bad aspects, set of defined passwords according to password polices scenario that arise

Keywords:

Passwords, system security, threat assessment, company policy, university policy

Table of Contents Abstract: ..................................................................................................................... 2 Keywords: .................................................................................................................. 2 Introduction: ............................................................................................................... 3 Password policy good aspects: .................................................................................. 3 Password policy bad aspects: .................................................................................... 4 Key recommendation: ................................................................................................ 6 Conclusion: ................................................................................................................ 6 References: ................................................................................................................ 7

2

MADDULA SAIMOHAN, STUDENT NUMBER 3699961

Introduction:
In today's increasing dependence on computers and computer systems in the world, we must rely on the security and confidentiality of the connection to your computer. Traditionally it is with the username and password. "Password is the same entity, in order to confirm the identity of entities related information." [Bishop] is a set of passwords can be generated automatically by the system or by the entity or user-selected string. Password can be from a single character password, this may be a few hundred words long, and is composed of a series of words and phrases. The goal is to verify the user password. This is a message that the user knows. If someone the user to guess the password, they can simulate the user. "Rainbow Technologies, a recent survey, the use of unsafe code, too expensive - and potentially dangerous enterprise data." [Rosencrance] survey results are based on 3000 IT professionals from the reaction, found that most users secure password. Many users a user name and password itself is weak, and many people write down passwords. Much of this is exacerbated by the frequent need to change your password. In fact, the study found that 55% of end users report that they say that their passwords in a time less than 9% of all user passwords are written down. Moreover, 40% of users reported that they share their passwords. Overview of the company for nearly 50% the users, more than 24% 8% user name and password, or more, at least five passwords. 51% of the interviewed customers, they need to help their applications because they have forgotten the password. So how to solve? 80% of respondents said that their organizations actually increased their password policy requiring "non-character password, or a combination of numbers and letters." This led to more users forget the password or write their passwords. The other extreme, there are more than 20% reported that they do not regularly change your password.

Password policy good aspects:
Urgent task is to organize and submit a...
tracking img