MGT422H5 Lecture Notes - Lecture 8: Public Key Certificate, Password Cracking, Public-Key Cryptography

70 views2 pages
15 Apr 2017
School
Department
Course
Professor

Document Summary

Common access controls: password, physical, logical not able to access a system. Are effective when it"s available to employees. Have their own specific access own user id or password. Review access control list to ensure people who should have not have access do not have access. Password: complexity, length, password rules not same as personal info, password history, change your password every couple of months. Biometris retina scan, facial recognition, fingerprint, dna, Any time set up an id on windows every id must have an 8 digit password, password expiry. When set up user profile, only it wil have access to change some info what"s the reason to by- pass. Firewall online security measure, prevents hacking, whenever hacker is trying to hack firewall stops this. Firewall logs logs are reviewed by management. There could be unauthorized / authorized traffic that is coming in. Symmetry use same key to encrypt and decrypt.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents