CISS 400 Bethesda University of California Password Protection Policy Discussion

User Generated

Qsnvmba32

Computer Science

CISS 400

Bethesda University of California

CISS

Question Description

I'm working on a operating systems question and need an explanation and answer to help me learn.

First, complete the Hands-on Projects 13-1, 13-2, 13-3, and 13-4 from your text. Next, attach the text file from 13-2 as well as text file with the date, time, and number of times the program has run from 13-4. You do not need to write any of the memos or notes outlined in the activities. I want you to get a feel for the activities you are performing for this investigation before you begin reviewing some policies that address potential legal issues.

Now, let’s set the scene:

Dan is a bit nervous about the Robinson investigation: “It’s a legal minefield.” He asks you to identify the policies that should be reviewed and understood in preparation for the case being thrown out due to legal issues, or, even worse, a lawsuit.

Browse the policies on the SANS institute website. (You may choose other sites as well based on your chapter reading.)

Identify at least three policies you believe need to be understood when conducting an investigation involving cloud storage. Give a short rationale for each policy you select.

Unformatted Attachment Preview

Student has agreed that all tutoring, explanations, and answers provided by the tutor will be used to help in the learning process and in accordance with Studypool's honor code & terms of service.

Explanation & Answer

View attached explanation and answer. Let me know if you have any questions.

1

CISS 400 DEA - Digital Forensics
Student Name
Course name:
University name:
Professor's info:

2

Password Protection Policy
Passwords are essential for securing user accounts. Unauthorized access and
exploitation of the organization's resources are the outcomes of a poorly picked
password. As a result, all employees and contractors with access to a company's
system must follow the steps listed below to choose and secure their passwords.
To begin, all passwords at the user and system levels must follow the password
construction guidelines. Users must create a separate, distinct password for each
account. Users may not use passwords associated with their work for personal
accounts. User accounts granted authorizations through group memberships must
have a password that is distinct from the passwords of other users (SANS Institute,
n.d.).
Second, only update credentials if you have cause to believe they have been
compromised. The InfoSec Team may do password cracks or guesses periodically or
randomly. In case a password is deciphered in one of these scans, then the user must
replace the password as per the password security guidelines (SANS Institute, n.d.).
Thirdly, authorized users should never share passwords with others. All
passwords must be handled as sensitive and confidential company information. Users
should not include passwords in email messages, alliance cases, or other means of
electronic communication, nor should they be shared with anybody over the phone.
Passwords can be kept in password managers that the company has authorized. The
'remember Users should also avoid password' function of applications. Any user who
suspects their passwords have been compromised must report the situation and reset
all of their passwords immediately (Hashem, n.d.).

3

Application developers must include the following security features in their
programs. Users should never send passwords over the network in clear text.
Applications must support individual user authentication rather than group
authentication. Role management needs to be backed up by programs so that one
person can take over another function without knowing the other's password.
Passwords should never be saved in plain text or in any other form easy to reverse.
Finally, multi-factor authentication is recommended for both personal and work
accounts.
Employee Internet Use Monitoring an...

greelnaa185 (16602)
New York University

Related Tags