Preview

AD Password Policy Planning

Good Essays
Open Document
Open Document
428 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
AD Password Policy Planning
Unit 7. Assignment 1. AD Password Policy Planning

To: Business Manager

A reasonable approach for an AD password policy, this will be determined by how, & what your ideas are and what your trying to accomplish. I know that you’d mention that a competitor has recently been hack into and security is the number one thing that should be addressed. This does not have to mean that you have to lose productivity over trying to secure your networks information. Simple measure like user names and passwords can be used to protect less sensitive information however how strong you make those usernames and passwords can have a great effect on how well your information is protected.

An effective password requires a necessary degree of complexity. Three factors can help users to develop this complexity: length, width & depth. Length means that the longer a password, the more difficult it is to crack. Simply put, longer is better. Windows, for example, is not always case sensitive; meaning it doesn’t know the difference between ‘A’ and ‘a’. Some operating systems allow control characters, alt characters, and spaces to be used in passwords. Here are good examples to use for secure practice:

1. uppercase letters such as A, B, C;
2. lowercase letters such as a, b, c;
3. numerals such as 1, 2, 3;
4. special characters such as $, ?, &;

When planning password policy’s stress extra protection, in some cases, a good password is enough protection to keep out intruders. In others, it’s just a start. Encryption and one-time passwords add extra protection to systems. Encryption means garbling the password to protect from sniffers or other onlookers, through a particular scheme that can be deciphered from the other end of the connection. Users should exercise extreme caution when writing down or storing passwords. Stories of hackers obtaining passwords through shoulder-surfing and dumpster diving are not urban myths, they are real. Here a good practice for a company to

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    -In reference to previous network plan U1A1 GPO and AD will be created and upheld for the internal network. GPO will be in place to provide username and password security policy for external network users. (System/Application Domain)…

    • 565 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Mutandum Corporation Case

    • 963 Words
    • 4 Pages

    There are numerous reasons to retire our computer technology. Some systems become obsolete due to current technological advances. Some are replaced because they become infected with viruses or otherwise no longer function properly. And others simply just don’t meet the requirements of our business. In order to retire these systems in an efficient, safe and economical manner, we must take into consideration numerous factors that would otherwise but our business at risk. The following policy includes the implementation of recommendations that will keep sensitive information secure while ensuring that we remain in compliance with federal regulations all the while keeping to our business model centering on efficiency.…

    • 963 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    The plan to secure the workstation domain enforces a strong password policy on each workstation and also enables screen lockout protection for inactive times. Keeping all workstations with an up to date antivirus is essential. Furthermore, content filtering features will arrange access of specific domain names according to AUP definitions. In addition, workstations will have up-to-date application software and security patches conferring to company guide lines. As part of the workstation security strategy IT will disable the auto-play feature and will enable automatic scan for any external devices that may be connected to the machine. This measure will ensure the content is secure.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab 4

    • 327 Words
    • 2 Pages

    In this lab, you used group policy objects to create a minimum password length password policy and link it…

    • 327 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    We will educate employees on how to properly secure information by user ID and password management training. Instructing them on how to…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    I can understand your concern with your network security and better securing your information without losing productivity. You can set up your users to have their passwords be changed at a certain time and I would recommend a short amount of time in-between. And also you can have the passwords be in a certain context or to be made a certain way and make sheer that the security levels are high on them so that a hacker has a harder time to get in to the network. I recommend you use the following format; using capital and lower case letters the first letter of their name, their whole last name and their employee number, ex. “JVentura10415867@Domain*%$.Local” if someone tried to hack the account and all that they knew was the person name and the domain name they could not get in because it is very unlikely that they would know that person employee number and if they do then you have a spy in your company. Can also buy better security items to better your network things like smart card, finger print scanners, retinal scanners, and others. But I only recommend these for really sensitive information and only for certain users in your company. I hope that this has helped you in any way and I wish the best of luck to you.…

    • 327 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 331 Words
    • 2 Pages

    Solution: Create a recurring change of passwords, say once every few months, for your company. Have the passwords require a combination of numbers and letters, as well as a special character.…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    For the LAN domain, Make sure wiring closets, data centers, and computer room are secure. Use a WLAN network keys that require a password for wireless access. And implement encryption between workstation and WAP to maintain confidentiality.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Don’t use passwords that are less than eight characters. It is risky. Online criminals and hackers could guess or crack such passwords. However, you should remember that the longer your password, the harder it would be to guess or crack.…

    • 599 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Note. The Week Two assignment has been identified as a tool to assist in the university’s Programmatic Assessment Project. As such, completed student assignments may be periodically sampled for program analysis purposes. To assist in maintaining the integrity of the data collected, do not change the content of this assignment. Please delete this note before submitting to students.…

    • 627 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    1. ADI Employee passwords are to be kept strictly confidential. Each user is solely responsible for the activity taking place under their I.D…

    • 1402 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    LVN RESUME TEMPLATE

    • 291 Words
    • 2 Pages

    Fully credentialed LVN with experience providing compassionate care in a hospital environment at Ronald Reagan UCLA Medical Center. During my clinical hours at UCLA I gained in depth experience on various units such as medical surgical, pediatrics, labor and delivery, postpartum care, neurology, liver transplant unit, oncology, and gynecology. My training includes performing full health assessments, keeping accurate health records, performing both male and female catheterizations, and maintenance of Gtube and NGtubes. I also administered all oral medications including insulin administration and provided all basic bedside care to patients.…

    • 291 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2.2 Password protection could be used to ensure security when storing and/or accessing information. Also ensuring that no-one who is…

    • 244 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The Great Awakening

    • 952 Words
    • 4 Pages

    For us to see the significance of the religious revivals known as the “Great Awakening,” we need to take a brief glance as to what caused it to happen. Going back into the 17th century, we will notice that fighting has ceased between political and religious leaders. This is due to the fact that the Church of England has come to establish a State religion. As a result of an establishment of a State religion, other religions such as Catholicism, Judaism and Puritanism were repressed. While having a State religion is a good idea for the political leaders, it created a dry, boring and complacent attitude among the citizens. Worshipping now became just an act. Going through the motions of worshipping, but not actually coming from the heart. This brings us to the spark of the “First Great Awakening,” which was the first of colonial America’s major religious revivals.…

    • 952 Words
    • 4 Pages
    Good Essays

Related Topics