Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Theories Expert

Problems with Passwords Authentication

Network and application managers need to know who is accessing their systems to determine appropriate access levels. Typically, they require that users create secret passwords. A secret password, known only to the user, allows an administrator to feel confident that a user is who the user says he or she is. Systems administrators even have the authority to determine the characteristics of passwords. For example, they may set a minimum length and require that a password include numbers, symbols, or mixed letter case. They may also require that a user change his or her password every few weeks or months. These approaches have numerous problems:

• Users often forget complicated or frequently changing passwords, resulting in frequent calls to a help desk. The help-desk employee then faces the burden of identifying the employee by some other means and resetting the password. This process takes time and is subject to social engineering.

• Users may write down their passwords. However, this leaves passwords subject to discovery and theft. • Users often pick the same password for many different accounts, which means that someone who discovers one of these passwords then has the "keys" to all the accounts.

• Users may pick an easy-to-remember password, which is easy to anticipate and therefore easy to guess. Password-cracking programs cycle through entire dictionaries of English language words and common word/number combinations such as "smart1" or "2smart4U."

• Users may give away their passwords over the phone (social engineering) or via e-mail (phishing, a type of social engineering) to individuals representing themselves as a system administrator. Perhaps you have already received e-mails purportedly from a financial institution claiming identity or account difficulties and asking you to "reconfirm" your account information on their authentic-looking Web site.

As you can see, using passwords to identify a person is fraught with problems. Here are some alternatives to explore. Look up each authentication approach listed below on the Internet, describe the method in your own words (be sure to cite your sources), and briefly list the advantages and disadvantages.

a. Biometrics (biological measuring)
b. Smart cards
c. Biochips

Management Theories, Management Studies

  • Category:- Management Theories
  • Reference No.:- M91777393

Have any Question?


Related Questions in Management Theories

Write a paper of 1000-1500 words that addresses the

Write a paper of 1,000-1,500 words that addresses the following: 1. Discuss two or three of the major shifts that have occurred in managerial theories and concepts pertaining to the evolution of human resources. 2. Descr ...

Assessment - business research proposalfor this assessment

Assessment - Business Research Proposal For this assessment, students are expected to present a written research proposal that is based on the literature review (Assessment 1) and demonstrates their understanding of busi ...

Each of 30 teams in a league has a demand for generic

Each of 30 teams in a league has a demand for generic advertising of Q = 260 - 4P. Price is measured in thousands of dollars. Ads cost $510,000 each. How many ads will the teams want to purchase as a group?

Benchmark - community teaching plan community

Benchmark - Community Teaching Plan: Community Presentation Note: This is an individual assignment. Based on the feedback offered by the provider, identify the best approach for teaching. Prepare a presentation to accomp ...

Assignment -personal reflection 1 -instructions - watch

Assignment - Personal Reflection 1 - Instructions - Watch Milgram's obedience video: Milgram Experiment Proves We Blindly Obey Authority. Consider the following. Christ called his disciples to follow him (Mark 1:17). He ...

Tasks1select any four of the following fundamental

Tasks: 1. Select any four of the following fundamental theories: o The Ten Commandments o The Justification of Human Rights o Utilitarianism o Aristotelian Ethics o International Ethics Standards for Business o Distribut ...

Looking at leadership through complexityleading

Looking at Leadership Through Complexity Leading knowledge-based companies is different from leading industrial-based companies (Uhl-Bien & Marion, 2008). The authors noted "complexity leadership theory, a leadership par ...

Discussion please locate one peer-reviewed journal

Discussion : Please locate one peer-reviewed journal (Scholarly Journal Article) related to the topic: Strategic Communication for Business and the Employee. This assignment must a professionally designed PowerPoint Pres ...

In chester barnards view an organisation can be efficient

In Chester Barnard's view, an organisation can be 'efficient' without being 'effective'. Discuss. Discuss your answer, with reference to the key relevant theoretical contributions and academic studies that were reviewed ...

After paying 150 you are allowed to open a newspaper

After paying $1.50, you are allowed to open a newspaper vending machine freely (i.e. get as many as you want). In contrast, a soft drink vending machine only drops one can after you pay the same amount of money. Why? Ple ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As