Access over 35 million academic & study documents

Password Security Policy

Content type
User Generated
Subject
Computer Science
Type
Homework
Rating
Showing Page:
1/5
RUNNING HEAD: IMPLEMENTING ADMINISTRATIVE SECURITY CONTROLS
1
Implementing Administrative Security Controls
Name
Institution

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/5
2
IMPLEMENTING ADMINISTRATIVE SECURITY CONTROLS
Implementing Administrative Security Controls
Passwords are the most common and most utilized form of authentication for accessing a
computing resource. Due to the diversified use of weak passwords, the proliferation of automated
password-cracking programs, and the activity of malicious attackers, passwords have been
described as one of the weakest forms of security policies. No matter how secure one makes their
password policies, eventually the users will choose their passwords. Therefore, the process of
implementing the security policy is the key to a strong security system.
This paper focuses on the process of password configuration in a Microsoft operating
system that would be most appropriate for enforcing a password policy. One important fact that
must be kept in mind while enforcing this policy is that the security of a password is dependent on
the ability to keep a secret. The first step in the enforcement process is to enforce how frequently
a password used frequently can be used again. This method of enforcement is used to discourage
users from reusing previous passwords thus encouraging privacy. Windows 2000 can store up to
24 past passwords in its history thus making the chance of repeating a previous password very
unlikely. This policy can be enabled by setting the size of the password history through the field
called password remember (Microsoft, 2015, p.1). Furthermore, to prevent users from
manipulating the enforce password policy, they should only be allowed to change their password
after a given period.
Another process that would be appropriate for determining a strong password policy is by
setting a maximum age for password usage. This aspect of the security policy is to set a specific
period after which each user must change their current password. The goal is to force all users to
periodically change their password to enhance privacy and secrecy. In Microsoft, the default period

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/5

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 5 pages?
Access Now
Unformatted Attachment Preview
RUNNING HEAD: IMPLEMENTING ADMINISTRATIVE SECURITY CONTROLS 1 Implementing Administrative Security Controls Name Institution 2 IMPLEMENTING ADMINISTRATIVE SECURITY CONTROLS Implementing Administrative Security Controls Passwords are the most common and most utilized form of authentication for accessing a computing resource. Due to the diversified use of weak passwords, the proliferation of automated password-cracking programs, and the activity of malicious attackers, passwords have been described as one of the weakest forms of security policies. No matter how secure one makes their password policies, eventually the users will choose their passwords. Therefore, the process of implementing the security policy is the key to a strong security system. This paper focuses on the process of password configuration in a Microsoft operating system that would be most appropriate for enforcing a password policy. One important fact that must be kept in mind while enforcing this policy is that the security of a password is dependent on the ability to keep a secret. The first step in the enforcement process is to enforce how frequently a password used frequently can be used again. This method of enforcement is used to discourage users from reusing previous passwords thus encouraging privacy. Windows 2000 can store up to 24 past passwords in its history thus making the chance of repeating a previous password very unlikely. This policy can be enabled by setting the size of the password hist ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Great! Studypool always delivers quality work.

Studypool
4.7
Indeed
4.5
Sitejabber
4.4