P3
Examples:
·
Passwords including weak vs. strong passwords and
how to test for it
·
Diskless Networks
·
Audit Logs
·
Backups
·
Firewalls
·
Software Updates
1. Weak password is easy to be hacked by a human and
a computer. People use weak passwords so
they can remember them. The simpler the password its more easier to be
detected.
2. Strong password is hard to detect by a human and a
computer. People have to use a larger number of character and mixed number
digits upper and lower case letters and also use special character (#...?$.etc)
and lots of people have problem with forgetting them often.
Also they can you different websites to check if their password its
strong enough eg. http://howsecureismypassword.net/
3.
Diskless
Networks is a computer system that doesn’t have its own disk. It stores its
files on a network server. This way of storing files has a lower cost because
its one disk drive with a large capacity. And its better than having
several disk drives. Risks of causing
damage to information is being stolen or transferred to USB storage device. In
a diskless network they don’t have CD/DVD drives , USB ports and they block
windows of recognising news USB devices. In this case the BIOS must be
configured with a password so it can stop people who trying to add new devices.
For example the college has different hard drives on the network that students
not allowed to have access and also some lectures are not allowed to access
some of the hard drives only the technicians can access all of them.
4.
Audit logs: Audit
logs are used to keep a record of network and database activities, recording
who has done what, where they did it and when.
No comments:
Post a Comment