Password Security Threats

Superior Essays
Password security is a very important topic with many counterparts. It is important to know the security risks involved with passwords. Complex passwords have become very popular for businesses in order to log into your office computer. Often times you are required to change that complex password on a regular basis as well, which can make remembering the password extremely difficult and will often times cause the user to write it down or store it somewhere. Often times employees may share their passwords with a co-worker and this can be for a logical reason should anyone need to access that information if the person is out sick. Another issue may be using the same password for multiple accounts. There are also security risks if entering your …show more content…
If the user creates an 80-bit password, that should be sufficient. There is a website available at no cost to get an idea of how secure a specific password is. Simply visit www.howsecureismypassword.net and all the user has to do is put in the password and it will tell you how long it would take a desktop PC to crack the password. Another benefit to complex passwords are that they must be changed frequently, the company should set up a time frame such as every 30 to 60 days and refuse repeat passwords. A security feature should also be turned on that locks the user out if multiple incorrect attempts have been made to log into a particular station.
Risks
Although there are many benefits to requiring employees to create complex passwords, there are also some risks involved. Since complex passwords are long, employees may be tempted to write them down. The longer more complex passwords are also likely to be forgotten. This can cause the employee to frequently use the forgot password option or the need for the IT team to reset passwords. The employer should provide alternatives to writing passwords down such as the use of a password manager (discussed later in this paper) or suggesting a mnemonic
…show more content…
Users need to understand that anytime a public network is accessed, their information is at risk. Often times a library may seem like it would offer a more secure network, but this is not the case. Users must constantly be aware that any businesses that offer free Wi-Fi are not providing a secure network. While these areas may be safe places to check social media, it is not a safe place to access any websites that contain personal data. There are a few simple tricks out there to keep information a bit more secure, make sure to turn off sharing and always connect as public, not private. Another way to keep information a little safer is to only have the Wi-Fi on the device turned on while connected to the internet. If there is no need to access the internet, then turn the Wi-Fi setting off.
Virtual Private Network
Another option for employees who travel is to consider a virtual private network (VPN). The purpose of a VPN is to secure the internet connection. It will make sure that all of the data that is sent o received while connected is encrypted and secure. Employees would have the option of connecting to the VPN from any places that offers access to the internet. Since the VPN is connected to a remote data center, users will have access to data even if they are not physically on the same local area network (LAN).
Password

Related Documents

  • Improved Essays

    The lock should require multi-factor authentication, such as a card swipe and an access PIN, or a biometric id check and a PIN. Preferably, the PIN entry keypad would randomize the position of the digits for each PIN entry attempt. The system should be connected to the network, be centrally configured and record all access attempts in a log. c) Video Surveillance System: In order to keep records of who is physically accessing critical areas and devices, video monitoring cameras should be installed with good views of those areas. At a minimum, cameras should have a view of the inside of the wiring closet / server room, the entry point to the wiring closet / server room, and the main entrance to the company…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    For the office users, the main form of connection will be via LAN wired connections connect directly to the Switches. The laptops PC's and tablets will connect via a secure wireless connection that will be provide using 2 Cisco Small Business WAP551 Wireless Access Point. The first location is the senior offices and second location the common office hosting most of the other employees. The router to used is a Cisco 2951 Integrated Services Router (ISR), this router delivers highly secure data, voice, video, and application. It has 3 integrated gigabit Ethernet ports that are enough to serve the office.…

    • 216 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Ilab 5 jerry Metcalf Keller Graduate School of Management Professor: Gregory Gleghorn 6/4/2017 VPN Connection The type of VPN connection solution that we will be using to connect user to the internet work will be the Cisco Any connect client and the RSA secureID. We will be going in to detail of how the connection process goes and also how to configure it. Both clients are required in order for the user to authenticate and connect to the company network. When the user is connected they will be able to do their job remotely and send and retrieve information remotely.…

    • 678 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Kaplan University IT286 Unit 8.2 Jennifer Polisano Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Attackers exploiting default configurations to gain access to the network and to information stored on devices in the network are major threat to home gateway devices. In order to mitigate this threat there are many common default configurations a user should change. When setting up a home network, a user should make sure to change the default passwords. They should set up a strong account password and wifi password using best practices. The user should use a strong security protocol such as WPA2 instead of the default WEP which is not secure.…

    • 693 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Data Communication and Net-Centric Computing (COSC 2061) Assignment 2 Student Name: Weibin Zhong Number: s3503887 Introduction This report is identifying what are FDMA, TDMA and CDMA and how to maintain the communication seamlessly and the roaming service as well as the cost of roaming service. Furthermore, the 1G, 2G, 3G and 4G generations will be discussed.…

    • 1458 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    After analyzing the current situation of accounting firms, it seems that this organization understands the importance of information security but it is severely lacking. This requires to introduce a user training program to make every employee understands the importance of how they behave themselves every day in protecting the company’s network…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    1. Policies: Policies like Acceptable Use, Internet Access, and Email and Communications Policies can take the risk out of the user’s hands of doing what is right. Sites that could hold malicious codes and viruses can simply be blocked from access so that it isn’t even in their “hands” to make the decision. 2. Provision Servers: Using software like IPAM, making sure that your servers all have static addresses assigned to them.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 3 Lab 1

    • 1712 Words
    • 7 Pages

    1. Goal Following the introduction of Windows-based systems into our virtual environment in Lab 3, this final individual lab takes the base Microsoft administrative technologies put in place such as Active Directory, and pushes them forward with more advanced systems administration features. The major new additions to the infrastructure are Group Policy and fine-grained password policies where users, computers, and groups are given a more personalized as well as secure computing experience based on the role and importance those objects play in the overall infrastructure. I found the information as well as skills learned in this lab invaluable due to how important Group Policy is to Active Directory and how end systems as well as users are…

    • 1712 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Next, select “Change/Set Password” button. In the next dialog box you will be able to set up you password. Make sure you remember you password. You will need it to log in to your user account and to make any other changes to your system. Now next very important step is to secure your hard drive.…

    • 867 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    At no time should the workstation be used for personal email use, (i.e. sending or receiving), or social networking sites. The company has a secondary Internet Service Provider (ISP), and that should be used for personal email and social networking via your personal devices, such as cell phones and tablets. Again, you are not permitted to send company information using personal devices or email/social media. Key Control Maintaining constant watch over who has access to what electronic and physical key access is imperative.…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cyrusone: A Case Study

    • 812 Words
    • 4 Pages

    In a corporate environment, it is of utmost importance that unauthorized individuals are not allowed to access secure systems and networks. Passwords, fobs and PIN numbers can be shared to not only coworkers but people outside of the company that causes a huge security…

    • 812 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Vulnerable Password Effect on HIPAA Introduction The University of Mississippi Medical Center suffered from multiple HIPAA violations. An unofficial visitor to their campus had stolen one of their laptops, and due to the fact that UMMC’s network was unprotected because they used a universal username and password. The active directory containing 67,000 files was exposed to danger! There was an estimation of 10,000 patients files dating back to 2008 and he optical character recognition affirms that the university failed to disclose the individuals whose ePHI was believed to have been accessed.…

    • 544 Words
    • 3 Pages
    Improved Essays

Related Topics