Is not found in a dictionary (like school, tree, hotel, swim, etc.) 13. Is not your girlfriend’s or boyfriend’s name 10.ĭoes not include a sequence of letters like abcdefgh or a sequence of numbers like 123456 11.ĭoes not include places, names, cites, countries, street names, and so on 12. Special characters (` ~ ! # $ % ^ & * ( ) _ + - = 6.ĭoes not include your name, either the first name, last name, or middle name 8.ĭoes not include any of your family member names 9. These types of passwords use a combination of keyboard characters from each of the following categories: ■ #STRONG PASSWORDS CRACK#Strong passwords are more difficult to crack than simple ones. Users should also be instructed in the best ways to comply with the policies and what to do if they are unable to comply or if they observe a deliberate violation of the policies on the part of other users. The security plan itself should contain a program for educating network users-not only regarding what the policies are but also why they are important and how users benefit from them. The best security policies in the world will be ineffective if the network users are unaware of them or if the policies are so restrictive and place so many inconveniences on users that they go out of their way to attempt to circumvent them. It must contain characters from three of the four categories: lowercase letters, uppercase letters, numbers, and special characters. It must be a minimum of six characters in length. #STRONG PASSWORDS PASSWORD#The password cannot contain any part of the user's account name. #STRONG PASSWORDS WINDOWS#To ensure domain controllers are secure, there are a number of password requirements that are enforced by default on Windows 2003 domain controllers: ▪ Lack of a good password policy is an open invitation to them. Careless password practices (choosing common passwords such as “god” or “love” or the user's spouse's name choosing short, all-alpha, one-case passwords, writing passwords down or sending them across the network in plain text) are like leaving your car doors unlocked with the keys in the ignition.Īlthough some intruders might target a specific system, many others simply “browse” for a network that's easy to break into. In order to be effective, your password policy must require users to select passwords that are difficult to “crack” yet easy for them to remember so that they don't commit the common security breach of writing the password on a sticky note that will end up stuck to the monitor or sitting prominently in the top desk drawer.Ī good password policy is the first line of defense in protecting your network from intruders. It might seem simplistic to say that your comprehensive security plan should include an effective password policy, but it is a basic component that is more difficult to implement than it might appear at first glance. In the networking world, passwords (in combination with user account names) are normally the “keys to the kingdom” that provide access to network resources and data. Tariq Bin Azad, in Securing Citrix Presentation Server in the Enterprise, 2008 Password Security
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |