2.1 Answer
Information security strategic planning is used by organisations to mitigate, accept, transfer or prevent information risks related to people, technologies and business processes and adapting new security measures to its business environment. The methodology or the strategic is used for organizations to adequately protect the integrity, availability and confidentiality of information. (LeVeque, V. 2006)
The benefits of an effective information security strategic plan is, …show more content…
(2006). Information Security – A Strategic Approach , Its relevance to IS/IT security and how it probes into a security problem is not utter explained in any chapter in the book. The answer to this lays on the author's experience as an information security consultant working for a list of clients in the private and public sector (LeVeque, V. 2006). LeVeque speaks of strategy planning and how it can nurture an organization, how it works with information technology and adds security on top of the strategic planning. The strategic planning method assists organizations predict future goals and implementing secure business processes to protect the information and its benefits are significant, which can offer a competitive …show more content…
Passwords will always have a risk of an attacker guessing the correct the password
(Gollmann, D. 2011). If the password has been thought prudent the risks of an attacker guessing it will drastically decrease (Gollmann, D. 2011). A study from 2010 was published by Ashlee Vance where the most common password was “123456” and in this study Vance mentions “easier a password is for the owner to remember generally means it will be easier for an attacker to guess”. A hard password to remember by the user will mean it will be hard for an attacker to guess it. If the password is hard to remember then the user might need to write it down, which ends with another opportunity for the attacker. This leaves a “conclusion” the better memory a person has the stronger password can they have. The only solution here will be to make precautions to hide the note with the password. It can't possibly be right. The Vance study doesn't mention defences like Dieter, passwords