The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | May 2017 |
| Last Sign in: | 283 Weeks Ago, 2 Days Ago |
| Questions Answered: | 27237 |
| Tutorials Posted: | 27372 |
MCS,MBA(IT), Pursuing PHD
Devry University
Sep-2004 - Aug-2010
Assistant Financial Analyst
NatSteel Holdings Pte Ltd
Aug-2007 - Jul-2017
Evaluate a given security policy and practice (hands-on) implementing the needed administrative security controls.
For this written assignment assume the following security policy has just been adopted by your company and you as the network administrator are responsible for implementing the “mechanism” to enforce this policy.
Policy Statement: Passwords are the most frequently utilized form of authentication for accessing a computing resource. Due to the widespread use of weak passwords, the proliferation of automated password-cracking programs, and the activity of malicious attackers, they are very often also the weakest link in securing data. Password use must therefore adhere to the following policy statement:
All passwords mush be strong passwords and follow the standards below.
To maximize your learning with this written assignment, it is recommended that you research how passwords standards can be enforced (your choice of the target OS) and that you attempt to implement this policy on a non-production system – preferably one that you have implemented for use in this course.
In a two page (maximum) paper, delineate the process you would adopt, specific to your chosen OS platform, to enable enforcement of the password policy. Include screen shots of scripts and/ or application settings that you utilized to accomplish this assignment.
Be sure to proof and edit your work before submitting. Always cite your source using APA guidelines. no plagarsim and need original content.
----------- He-----------llo----------- Si-----------r/M-----------ada-----------m -----------Tha-----------nk -----------You----------- fo-----------r u-----------sin-----------g o-----------ur -----------web-----------sit-----------e a-----------nd -----------acq-----------uis-----------iti-----------on -----------of -----------my -----------pos-----------ted----------- so-----------lut-----------ion-----------. P-----------lea-----------se -----------pin-----------g m-----------e o-----------n c-----------hat----------- I -----------am -----------onl-----------ine----------- or----------- in-----------box----------- me----------- a -----------mes-----------sag-----------e I----------- wi-----------ll