MGT422H5 Lecture Notes - Lecture 8: Public Key Certificate, Password Cracking, Public-Key Cryptography
Document Summary
Common access controls: password, physical, logical not able to access a system. Are effective when it"s available to employees. Have their own specific access own user id or password. Review access control list to ensure people who should have not have access do not have access. Password: complexity, length, password rules not same as personal info, password history, change your password every couple of months. Biometris retina scan, facial recognition, fingerprint, dna, Any time set up an id on windows every id must have an 8 digit password, password expiry. When set up user profile, only it wil have access to change some info what"s the reason to by- pass. Firewall online security measure, prevents hacking, whenever hacker is trying to hack firewall stops this. Firewall logs logs are reviewed by management. There could be unauthorized / authorized traffic that is coming in. Symmetry use same key to encrypt and decrypt.