Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

The following is an extract from a corporate security policy:

Logon Procedures:

It is the responsibility of service providers, system administrators, and application developers to implement logon procedures that minimize opportunities for unauthorized access. Threshold and time periods are to be defined by the Trustee.

Logon procedures should be enabled that disclose the minimum information about the system, application, or service to avoid providing an unauthorized user with unnecessary assistance.

Logon procedures should:

  •  Not display system or application identifiers until the logon process has been successfully completed.

  •  Not disclose/display to the screen the password entered during logon.

  •  Display a specific warning that the system and/or application should only be accessed by authorized users.

  •  Not provide help messages during the logon procedure that would aid an unauthorized user.

  •  Internet-based systems must only request authentication credentials via HTTP POST method using encryption, such as TLS.

  •  Validate the logon information only upon completion of all input credentials. If an error condition arises, the system should not indicate which part of the authentication credentials is correct and which part is incorrect.

  •  Limit the number of unsuccessful logon attempts allowed before an access denial action is taken. Three attempts are recommended and in no circumstances should more than six attempts be allowed.

  •  Establish thresholds for the maximum number of denial actions within a given period before further unsuccessful logon attempts are considered a security-relevant event. Six attempts by the same logon ID or requesting device in a 24 hour period should be set as an upper threshold. Exceeding thresholds should cause one or more of the following:

  •  The authentication device is suspended or rendered inoperable until reset.

  •  The authentication device's effectiveness is suspended for a specified time period.

  •  Logging of the invalid attempts and/or a real time alert is generated.

  •  A time delay is forced before further access attempts are allowed.

  •  Limit the maximum time period allowed for the logon procedure. 20 seconds is recommended, however 30 to 40 seconds may be required for two-factor authentication.

  •  Disconnect and give no assistance after a rejected attempt to logon.

  •  Display the following information upon completion of a successful logon:

  •  Date and time of the previous successful logon.

  •  Details of any unsuccessful logon attempts since the last successful logon.

The following is an extract from a detailed set of corporate security requirements (list 2):

2.2.2          OS Logon Authentication

2.2.2.1       OS Logon Identifiers

D-SEC-120     Logon identifiers for the execution environment (e.g. operating system) shall be required for system access.

D-SEC-121     Logon functions shall require a non-blank (i.e. not NULL) user identifier for logon.

D-SEC-122     Any default identifiers shall be capable of being deleted.

D-SEC-123     Logon Identifiers shall have a minimum length of six characters containing a mix of alphabetic and numeric symbols.

D-SEC-124     Logon identifiers shall be stored in a non-volatile manner.

2.2.2.2          OS Logon Passwords

D-SEC-125     Logon Passwords shall be required for system and service access.

D-SEC-126     Logon passwords shall not be disclosed/displayed to screen, when entered during logon.

D-SEC-127     Logon password lengths shall not be disclosed/displayed to screen, when entered during logon.

D-SEC-128     Logon functions shall require a non-blank (i.e. not NULL) user password for logon.

D-SEC-129     Any default passwords shall be capable of being deleted.

D-SEC-130     Logon passwords shall have a minimum length of six characters, containing a mix of alphabetic and numeric symbols with special characters allowed.

D-SEC-131     Logon passwords shall be stored in a non-volatile manner.

D-SEC-132     Logon passwords shall be stored in hashed form only.

D-SEC-133     Logon password storage shall use the SHA1 hash algorithm at a minimum.

D-SEC-134     Logon password storage shall use the SHA-256 hash algorithm as an alternative to the SHA-1 hash algorithm.

D-SEC-135     Logon identifier verification shall use a token method as an alternative to passwords.

D-SEC-136     Logon identifier verification shall use a biometric method as an alternative to passwords.

D-SEC-137     An age threshold shall be definable for all logon passwords.

D-SEC-138     Logon passwords shall be voided when the password has exceeded the password age threshold.

D-SEC-139     The age threshold for logon passwords shall be capable of being disabled.

D-SEC-140     The minimum age threshold for logon passwords shall be 30 days.

D-SEC-141     The maximum age threshold for logon passwords shall be 999 days.

2.2.2.3            OS Logon Function (Process)

D-SEC-142     Logon functions (processes) shall support password age checking.

D-SEC-143     Logon functions shall support a settable threshold of tries a user will be given to enter a valid logon ID and password combination.

D-SEC-144     Logon functions shall support disabling the threshold of tries a user will be given to enter a valid logon ID and password combination.

D-SEC-145     The minimum threshold of tries a user will be given to enter a valid logon/password combination shall be 1 attempt.

D-SEC-146     The maximum threshold of tries a user will be given to enter a valid logon/password combination shall be 15 attempts.

D-SEC-147     Logon functions shall lock out the keyboard when the threshold for unauthorized/invalid attempts is exceeded.

D-SEC-148     Logon functions shall support a settable time interval between 1 minute and 360 minutes that controls the period of keyboard lockout following the user failure to enter a correct logon/password combination within the allocated number of attempts.

Question: Identify 5 detailed security requirements that should be added to list 2 based upon policy statements in list 1 that are NOT covered by entries already present in list 2. Be sure to identify the policy statements in list 1, then add five new requirements to list 2 based upon those policy statements.

Question: Identify 5 policy statements that should be added to list 1 based upon detailed security requirements in list 2 that are NOT covered by policy statements already present in list 1. Be sure to identify the requirements in list 2, then add five new policy statements to list 1 based upon those requirements.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91595323
  • Price:- $30

Priced at Now at $30, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Can someone help solve this problem in lisp-programming

Can someone help solve this problem in Lisp-Programming language? More specifically in DrRacket. Exercise: A professor keeps the quiz grades of a student in a non-empty vector of non-negative numbers. Write a function th ...

Question suppose direction is an integer angle between 0

Question : Suppose direction is an integer angle between 0 and 359 degrees. You turn by a given angle and update the direction as direction = (direction + turn) % 360; In which situation do you get the wrong result? How ...

Question suppose you wanted to delete the trash of all

Question : Suppose you wanted to delete the trash of all users just tonight at 11pm using the just created /root/deleteTrash.bash script. Assuming that the deleteTrash.bsh script which deletes the trash of all users exis ...

Software engineeringeach of the following heuristics helps

Software Engineering: Each of the following heuristics helps make a good module according to some modularity principle. Identify the principle for each letter. Modularity principles: Principle of Small Modules Principle ...

What is the broadcast domain and ports for hubs and

What is the Broadcast Domain and Ports for hubs and bridges?

Question research the internet to obtain information on

Question: Research the Internet to obtain information on Windows Group Policies and the Group Policy Editor. • Review the critical considerations to prepare a procedure guide. • Organize all the steps necessary for imple ...

When i have a class that extends application public class

When I have a class that extends Application (public class Game extends Application) I can easily call it from my driver class by typing launch(Game.class). Now I have two other classes where one extends JFrame and the o ...

Analyse two of the three technologies provided focus

Analyse two of the three technologies provided (focus virtualisation, cloud computing and green computing). Summarise what each of your two selected technologies is, and what the technology does. Explain what improvement ...

Access your browsers security settings and configure the

Access your browser's security settings and configure the browser to refuse all cookies or to prompt you before allowing a cookie. Restart the browser; then visit several different Web sites. Be sure to visit popular sit ...

A chemistry student needsnbsp550 gnbspof dimethyl sulfoxide

A chemistry student needs 55.0 g of dimethyl sulfoxide for an experiment. By consulting the  CRC Handbook of Chemistry and Physics , the student discovers that the density of dimethyl sulfoxide is 1.10 g.cm^-3. Calculate ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As