Saturday, June 15, 2019

Database Systems Concepts Essay Example | Topics and Well Written Essays - 750 words - 3

Database Systems Concepts - Essay ExampleOne of the principles of cryptography is double-blind design Make it so as few deal as possible have get at to both key and lock. In this case, the solution is to have the executive encrypt the countersigns as well as improve security through mechanisms like besides watchword-encrypting the password folder, making the password folder a hidden folder and providing no information as to find it, having user records, etc. The best and simplest management is to encrypt the passwords in the first place. When a user enters a password, it is turned into dots or *****. This is to prevent onlookers from seeing it. But it is possible for that process to occur and for the password to still be saved in plain text elsewhere. When one signs up for a forum, it is quite often that ones plain text password is send to the person in an e-mail. This would mean that any trojan that could read e-mails could easily acquire the persons password for a site. Sol ving that fuss is certainly slightly stickier, save when it comes to an OS, its very easy. When the password is signed in, it is encrypted locally. This encryption needs to be chosen by the administrator. Only administration has admission charge to the encryption algorithm, so only the administrator green goddess log onto a computer and find passwords. That way, if a breach does occur and someone does find the password folder, they see gibberish. Ideally, user names should be encoded as well. What about password retrieval? Use password hint services. Upon signing up for the password, the user also creates some unique security questions. These should be unique enough so as to avoid potential social engineering approaches The classic What is your mothers maiden name or Who was your first pet can be risky. The best approach is to let the user type in their own question then answer it. However, this program will have to sort out sure that the password is not in the text at all, els e people give themselves backdoors which can compromise security. If this fails, then administration can log people in and recall passwords. Other basic security tricks can solve this problem, however. The password folder should always be hidden and password-protected itself by a password known only to the admin. This kernel that even if someone had a key to the encryption for the passwords, they still couldnt access the password list. And they would find it difficult to locate the password folder in the first place. Similarly, user logs of who logs in and out at various times is a deterrent to this activity. If only legitimate users can log on, then it is easy to find who did it and pursue disciplinary action. The problem comes when a password is stolen from one person by another employee or someone else with access to the company, but at the least, it starts the investigation appropriately. However, it is important to bear in mind that in the modern era its rarely someone breakin g into an office and steal passwords, or even some intrepid employee doing so. Rather, the most likely risk are keyloggers, trojans and malware that seek out the information. Again, if the information is sufficiently encrypted, there is no problem however, this means that the key should only be stored locally on the administrator computer, if it is stored locally at all (I would suggest keeping it in a CD-ROM). This means that proper anti-spyware programs and hygiene are key to avoid password theft problems. Ideally, administrators would sharply control what can be run and what cant be run. When

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.