Sunday, 9 February 2014

NDOSS2 P3



P3
Examples:
·         Passwords including weak vs. strong passwords and how to test for it
·         Diskless Networks
·         Audit Logs
·         Backups
·         Firewalls
·         Software Updates

1.      Weak password is easy to be hacked by a human and a computer. People use weak passwords so they can remember them. The simpler the password its more easier to be detected.

2.      Strong password is hard to detect by a human and a computer. People have to use a larger number of character and mixed number digits upper and lower case letters and also use special character (#...?$.etc) and lots of people have problem with forgetting them often.  
Also they can you different websites to check if their password its strong enough eg. http://howsecureismypassword.net/ 


3.      Diskless Networks is a computer system that doesn’t have its own disk. It stores its files on a network server. This way of storing files has a lower cost because its one disk drive with a large capacity. And its better than having several  disk drives. Risks of causing damage to information is being stolen or transferred to USB storage device. In a diskless network they don’t have CD/DVD drives , USB ports and they block windows of recognising news USB devices. In this case the BIOS must be configured with a password so it can stop people who trying to add new devices. For example the college has different hard drives on the network that students not allowed to have access and also some lectures are not allowed to access some of the hard drives only the technicians can access all of them.
4.      Audit logs: Audit logs are used to keep a record of network and database activities, recording who has done what, where they did it and when.




No comments:

Post a Comment