Cybersecurity - control access to your resources



should adhere to the policy detailed. Minimum length of 8 characters, 4 character sets, and does not allow the password to include the username. This password filter is available upon request. Passwords are a primary method used to control access to resources. Because authenticated access is seldom logged, a compromised password is a way to explore a system without causing suspicion.
An attacker with a compromised password can access any resource available to that user. Poor passwords or blank passwords are still a common occurrence on many networks. Many users still use dictionary words, hybrids, names, and default passwords. Additionally passwords less than 8 characters and passwords that are the same as the username are also frequently used. These types of passwords can be cracked within minutes or even seconds using any number of publicly available password crackers.

Scan passwords monthly to identify problems with weak passwords and to determine if the password policy is being followed. Password-guessing programs identify those users having easily guessed passwords. Passwords should be changed regularly (every 30 to 90 days). Set up password aging via Account Policy for Windows systems.

Passwords for privileged accounts should be at least 14 characters long and contain at least four different types of characters. Services should be run under their own Non-privileged accounts, as opposed to using the built-in SYSTEM or Administrator accounts. These service accounts should also have strong passwords. The Guest account should be disabled. Ensure that all accounts have passwords regardless if the account is enabled or disabled.

Passwords should be 12 or more characters in length on Windows systems, Users should not transmit passwords in cleartext and users should never share their passwords nor keep written passwords in an easily- accessible place. Passwords should be difficult to guess and include uppercase. Also lowercase, special character, punctuation, extended and numeric characters. They should not include dictionary words or names.


Comments

Anonymous said…
Ziggo webmail is een e-mailomgeving dat je met ieder apparaat met internet verbinding kan bereiken. Je kunt dus met je iPhone
Anonymous said…
kan geen mail verzenden in nieuwe vorm. ligt aan mij, maar het ‘pijltje’ uit de vorige mailvorm vind ik niet.
Anonymous said…
This comment has been removed by a blog administrator.
Anonymous said…
This comment has been removed by a blog administrator.
Anonymous said…
This comment has been removed by a blog administrator.

Popular Posts

Linux Professional Institute

Computer_Systems_Display_Divices

Recent_appetites_are_emeals_and_credential_stuffing_with_password_combination

A_more_intelligent_Internet_of_Things (IoT)

The IoT - i9 or M1 to 4K and 5G

Cybersecurity, why is it a growing profession

We-Chat_or_What'sApp

The key to cyber attack countermeasures as the cloud and IoT.

Backdoor_Trojan_known_as_SpeakUp