Free Essay

Best Practices to Secure Your Password

In:

Submitted By atulpatel
Words 251
Pages 2
Guidelines for changing and protecting Password for Indian Judiciary

A. Guidelines for changing the password: 1. Minimum password length must be 8 characters. 2. It must contain a mixture of alpha, numeric & special characters. 3. Combination of uppercase and lowercase alphabets must be used. 4. At least one (or more) special character (e.g. @,#,$,%) is required in the password. 5. Any common sequences from a keyboard row: qwerty, 12345, asdfgh are not allowed. 6. The password or any part of it should not be a dictionary word. 7. Old passwords are not allowed to be used again.
B. Password Protection Measures: 1. Default Password that is conveyed with the email account details must be changed immediately on the first login itself. 2. Information that can be easily guessed or obtained about the email account holder should not be a part of the password. This includes user's own name, spouse's name, vehicle license plate number, telephone number, D.O.B., PAN number, the brand of his/her automobile, the number of street of home/office address etc. 3. The password should not be shared with anyone. Password is to be treated as sensitive confidential information. 4. The password should not be revealed in email, chat, any other electronic communication. 5. Users should always decline the use of the “Remember Password" feature of any browser or other applications. 6. If email account or password compromise is suspected, this should immediately be reported to the NIC/e-Committee.

* Atul Patel
MS-CLIS 00017

Similar Documents

Premium Essay

Cyber Security

...and serving as GUI between the computer and user. With all the responsibility an OS is bound to have weaknesses. Typically, security vulnerabilities are usually rooted from glitches/bugs in the scripts that run beneath the OS. The most commonly used OS are Unix, Mac OS, and Microsoft Windows. With Windows being the leading OS, security patches have to be downloaded constantly. With out identifying a specific OS, there are advantages and disadvantages that can be implemented to protect the OS. Advantages of Securing OS Mitigating internal security threats is a common practice that should have a plan of action to protect business systems as a whole. Securing the physical hardware; servers, consoles routers etc. is essential. The actual system it self should be physically protected and authorized personal should be granted access to the systems. Many OS have back door access to get into the system incase a password is lost or authorized access can not be achieved. Another way to break into the physical console is simply flipping the switch to turn it off and reboot. During the booting process, there is a short window period where the server can be vulnerable and allow unauthorized...

Words: 2482 - Pages: 10

Free Essay

Best Practice Guide for a Ddos Attack

...Running head: Best Practice Guide Best Practice Guide for a DDoS Attack WGU – LOT2 Hacking Task 2 Abstract This paper will accompany a PowerPoint presentation about best practices for preventing a DDoS attack. This will be the best practice guide and will be mentioning and elaborating all of the points in the slideshow. Best Practice Guide for a DDoS Attack It is important to have a plan in place when dealing with a DDoS attack. This guide will serve as the best practice guide for the university. Outlined will be some of the best practices to help prevent a DDoS attack and will be followed by the university. The first thing that the university needs to do is create a response plan and practice the plan over and over. The worst thing that could happen is a DDoS attack starts to occur and nobody knows what to do or what their role is in stopping this attack. A team must be formulated and assignments can be broken down between team members to divide and conquer this attack. It is better to have five different people working on five different tasks or ways to stop the attack instead of five people working on one. The best way to understand the attack is to attack yourself and find the weak spots. Performing a vulnerability assessment on your network will give you a better understanding how your networks functions and where you can find single points of failure. Redundancy is being able to still continue working...

Words: 935 - Pages: 4

Premium Essay

Ipv6

...Mit 576 e-commerce 1)  With the aid of a diagram, describe a typical e-commerce model and how the various e- commerce technologies are implemented in your model? According to Dictionary.com * Commerce is a division of trade or production which deals with the exchange of goods and services from producer to final consumer * It comprises the trading of something of economic value such as goods, services, information, or money between two or more entities. Commonly known as Electronic Marketing, e-commerce is explained below. * “It consist of buying and selling goods and services over an electronic systems Such as the internet and other computer networks.” * “E-commerce is the purchasing, selling and exchanging goods and services over computer networks (internet) through which transaction or terms of sale are performed Electronically. The Business Process is described below, * A consumer uses Web browser to connect to the home page of a merchant's Web site on the Internet. * The consumer browses the catalog of products featured on the site and selects items to purchase. The selected items are placed in the electronic equivalent of a shopping cart. * When the consumer is ready to complete the purchase of selected items, she provides a bill-to and ship-to address for purchase and delivery * When the merchant's Web server receives this information, it computes the total cost of the order--including tax, shipping, and handling charges--and then...

Words: 4480 - Pages: 18

Premium Essay

Applying Owasp to a Web Security Assessment

...Web Application Security Project (OWASP) Web site and reviewed its Web application test methodology. You studied the standards and guides published by this project and summarized your findings. Finally, you drafted a Web Application Test Plan based on the information you gained in your OWASP research. Lab Assessment Questions & Answers 1. Identify the four recognized business functions and each security practice of OpenSAMM. 1) Governance 2) Construction 3) Verification 4) Deployment 2. Identify and describe the four maturity levels for security practices in SAMM. 1) Implicit starting point representing the activities in the Practice being unfulfilled 2) Initial understanding and ad hoc provision of Security Practice 3) Increase efficiency and/or effectiveness of the Security Practice 4) Comprehensive mastery of the Security Practice at scale 3. What are some activities an organization could perform for the security practice of Threat Assessment? Threat Assessment involves accurately identifying and characterizing potential attacks upon an organization’s software in order to better understand the risks and facilitate risk management. 4. What are the two recommended assessment styles for SAMM, and how are they used? ✦Lightweight - The assessment worksheets for each Practice are evaluated and scores are assigned based on answers ✦Detailed - After completion of the assessment worksheets, additional audit work is...

Words: 574 - Pages: 3

Premium Essay

User Authentication: Doing Us a Disservice

...offline has an online counterpart. This goes from simple email, access to paying your bill online (Roger ,M.and Carlos,C., 2007). Therefore, authentication is a process in which a user is asked to identify itself by providing certain details. Authentication has become the most integral part of all web based application nowadays. The most used form of authentication is the password and pin approach. Internet usage and online application are experiencing spectacular growth worldwide; there are over a billion internet users at present which utilises the use of the internet. Authentication is necessary in our everyday business because it will cut down the rate of identity theft and also stabilize confidentiality. User authentication faces a major problem as many security geniuses came out to proof that no single security completely protects users from theft. This essay will describe the limitations that can occur in practice of authenticating a user. It will help improve the reader’s knowledge on issue with authentication process, which is done according to the level of authentication. It will review the state of practice of a user authentication; also evaluate the authentication process with three website such as Facebook, Barclays bank and Yahoo. The future of user authentication will also be discussed. HOW IS USER AUTHENTICATION DONE There is always a tool or administrator who controls networks with secure computers, and also set privilege, role with policies and restriction. This...

Words: 3317 - Pages: 14

Free Essay

Sscp Domain Rearch Paper

...session, etc. A wireless link is likely to be limited in bandwidth error rates on a wireless link is much higher than that of a wired link. Different types of communication paths involved, one of which is radio link, particularly vulnerable to attack. Location privacy, any leakage of specific signaling information on the network can lead to an eavesdropper to approximately “locate” the position of a subscriber and thus hindering the subscriber’s privacy. Securing Internet Communication by using S-HTTP and SSL Secure Socket Layer (SSL) protocol is a protocol that uses public key encryption to secure channel over public Internet. A Secure Hypertext Transfer Protocol (denoted by S-HTTP) is an extended version of Hypertext Transfer Protocol that is provided for encryption of individual messages between client and server across Internet. S-HTTP is the basic application of SSL over HTTP which allows encryption of information passing between computers by protected and secure connections virtually. Securing E-mail by using S/MIME, PEM,...

Words: 769 - Pages: 4

Free Essay

Multi-Layer Security Plan

...this AUP. This AUP is made part of our Terms of Service (TOS). Your use and/or continuation of the Service constitutes your acceptance of this AUP. It is your responsibility, and contractual obligation, to ensure that your affiliates, agents, and/or customers (End User(s)) comply with this AUP.  Establish unique logon credentials for each user and require strong passwords. • Assign unique login credentials from the very beginning and have generally been very secure because of this. With the increasing demands of system security to ensure, logins have been made even more secure. This additional security is made possible through the use of Strong Passwords. A strong password is a series of words, letters, symbols and numbers which may be easy for a user to remember but difficult for another person to guess. We will review here the way in which you can implement additional login security through the use of strong passwords, and other advanced security settings.  Grant only the minimum privileges to each user required to accomplish that user’s tasks. • Identifying and influencing user behaviors that affect security are important to ensuring compliance within the User Domain. Behaviors that support or violate compliance with your security goals get the most attention. The following best practices do not guarantee compliance with all goals. However, they will lay the foundation to develop and maintain a secure environment. Workstation Domain:  Require unique user accounts...

Words: 821 - Pages: 4

Free Essay

System Hardening and Child’s Facebook Account

...opportunity to harden my daughters newly won MacBook within the timeframe of this course. In the Information Technology (IT) world hardening is a term that describes the process of configuring a system so that it is secure, for the purposes of preventing unauthorized access, providing protection from malware and maintaining integrity, security and privacy of personal or proprietary data. This paper will also describe methods for setting up and securing a child’s first Facebook account. Wireless Access Point Hardening Once our MacBook has been hardened, the next step should be connecting to the Internet through a Wireless Access Point (WAP), a function that is available through a wireless router, provided by the Internet Service Provider (ISP) or self-purchased. A wired connection would be more secure but, as a matter of functionality with a laptop it is more practical to configuring and utilize a wireless connection. The default service set identifier (SSID), which is basically the name of the WAP, will probably be set at the default of the name and model of the router. For security purposes the SSID should be changed to something unique and set to not broadcast this information. This increases the difficulty for any nearby threats scanning for and gaining access to your WAP for free internet or worse, using it as a gateway to try and access any systems connected to it. Next you should set the WAP access key; the standard Wi-Fi Protected Access 2 (WPA2) security utilizes 256-bit...

Words: 2226 - Pages: 9

Free Essay

Disseminating Organizational It Security & Trouble Shooting

...services expose your user accounts to the world. This article will focus on how to deal with user accounts of your current and former employees. Proper password aging policies will naturally take care of old or unused accounts. The idea behind password aging is that after a certain amount of time, a password expires. A password is less prone to compromise if it is changed frequently. Likewise, if an account is compromised, its usefulness will be limited to the amount of time left before the expiry timer concludes. Aging account passwords can reduce exposure if brute-force, social engineering, or sniffing attempts are successful. The strength of the password itself is also extremely important. It is imperative that the systems requiring users to change their passwords also enforce some level of strictness with regards to what passwords are accepted. An un-guessable password makes brute-force attacks the premiere method by which accounts are compromised mostly ineffective. An exhaustive brute-force attack will eventually discover all passwords, given enough time, but the idea is to use a password of sufficient length, so that it can’t be guessed in a reasonable amount of attempts. The successful guessing attempts normally find extremely inconsequential passwords, such as ones that are the same as the username. In next week’s article we’ll explore the password strength issue in more detail, when we dispel many myths about password security. For now, just know that password strength is...

Words: 3223 - Pages: 13

Free Essay

Database Concepts Research Paper

...(PII) in your password such as, Name, User name, Birthday, Pet’s name or Child's name. Don't use any word that can be found in the dictionary as your full password. Don’t use the same password for online banking that you use for social networking or email. Don’t give your password to someone over the phone. Try to use special characters such as non-alphabetic characters. Try to create passwords at with at least eight characters. Try to use a password vault application to protect and help manage your many passwords. Try to change your most critical passwords on a regular basis. The Windows operating system already has authentication functionality built-in. It has to do so. And if you're in a domain environment, there are special computers, called Domain Controllers, where authentication actually takes place. Those systems tend to be treated more security than regular servers, even SQL Servers. And therefore, if the username/password combinations are going to be stored on the most secure systems in the domain, that would be on the domain controllers (as a side note, a hash is what is actually stored there, not the password itself). If you let Windows do the authentication, then SQL Server doesn't have to store anything related to a username/password combination. And it's up to Windows to check the security. In other words, SQL Server is handing off this sort of authentication to processes which do it constantly. That's good, because it also means that if you're a DBA and your organization...

Words: 729 - Pages: 3

Premium Essay

Authentic Assessment Project

...Authentic Assessment Project By Jaime Galvan CMIT 320 Introduction Global Distribution, Inc. (GDI) would benefit from having an internal IT department rather than outsourcing. Several policies can be put in place in order to reduce the risk of computer attacks. By having an internal IT department any attacks can be dealt with immediately rather than depending on a third party to inform on the situation. The protection of the customer’s information should be the highest priority next to the company’s files. GDI Roles and Responsibilities The CSM will be responsible for the network and all its components in GDI. The staff will consist of 11 personnel who will assist in this endeavor. Policy Directives Information Security Policy Policy Information security is the protection of information from threats in order to ensure business continuity, minimize business risks, and maximize business opportunities. GDI information security program is managed by the Computer Security Manager (CSM). The CSM ensures that an acceptable level of information security is achieved. Information Security is not the purview of any one functional group and requires the cooperation of all. Members of the workforce are responsible for the information and assets that they receive, store, utilize and transmit. (Louis, 2014) Security Management Guidelines Guideline The CSM will provide the following services to GDI 1. Will be the computer security manager for GDI 2. The create...

Words: 1859 - Pages: 8

Premium Essay

Protect Your Password

...Password-protect Documents When most thing network computer is on you think about it, the valuable your or the Set a password in a Microsoft Office documents To encrypt your file and set a password to open it: 1. Click the Microsoft Office Button, point to Prepare, and then click Encrypt Document. data you create. After all, that data is the reason for having the computer and network in the first place--and it's the bits and bytes that make up that data that are your first priority when putting protective strategies in place. Some data is also not only do you lose it, you don't to even view authorization. confidential; not want to want others it without 3. In the Encrypt Document dialog box, in the Password box, type a password, and then click OK. You can type up to 255 characters but it is advisably to put best practice password which is alphanumeric 8 characters. Encryption is a standard method used to help make your file more secure. 5. In the Confirm Password dialog box, in the Re-enter password box, type the password again, and then click OK. 6. To save the password, save the file. Exposure of your identification card number, credit card, and bank account information could subject you to identity theft. Company documents may contain trade secrets, personal information about employees or clients, or the organization's financial records. What you should do Let's look at some ways to protect your all-important user data from loss and/or unauthorized...

Words: 319 - Pages: 2

Premium Essay

Securing Online Tranactions

...We take a look around and we have technology everywhere; Smartphones, tablets, laptops, desktops, and more. This access to technology gives us the access we need, access to send emails anywhere, look up information we may need, and able to purchase a shirt or even book a hotel online all from a phone or tablet. Being able to purchase items online is not new, it has been around for years, the thought of this is call ecommerce, ecommerce is the buying and selling or products or services via the internet (Merchant). Before the internet, before ecommerce, we had to go to Wal-Mart, or go into a GNC to get our vitamins that we need. We would spend so much time driving to store after store to get the things we needed, time and gas wasted. So when did online shopping start and how did it come about? The idea of online shopping dates back several decades, it was just not something that was thought of here recently in past few years. The idea of shopping and making purchases online were an idea of man named, Michael Aldrich. It was Michael Aldrich that was credited in the developing the start of online shopping (Merchant). It was Aldrich who back in the late 1970s, that took an old television and connected to a telephone and coined it "teleshopping" which he meant as shopping from a distance, this would be the start of the idea he had in mind (Merchant). The start and creation of the world wide web, or what we like to call the internet would be the milestone that was needed to reach...

Words: 3581 - Pages: 15

Premium Essay

Yield More

...Yield More Company you will have to implement the best practices to keep and to maintain the PCI DSS. First I will recommend you guys to install and configure a firewall to protect the credit card holder’s information. Then you will have to implement a secure password for the vendor system and not just use the default password for any of the devices. Encrypt transmission of the customer’s card number and pin over the open, public network, which mean when you store a card number encrypt all but the last 4 numbers of the card. Always have up-to-date anti-virus security software to protect from malware and different virus such as Trojan horse. Then you will need to assign an ID for each person with computer access, When then you will have to track and monitor the network to protect the card holders data. You must restrict the physical access to the data store from the credit cards, which you will have to apply biometric, eye scanner, passcode on the door for the ID for each person with access to the computer with the important data. I will recommend that you use all of the following listed above to keep a secure and updated database for the information to be keep safely and lower your risk of being sued for poorly secured card information if not stored properly. If you implement all of the following above you are taking care of all the things PCI DSS will be checking for with a yearly follow up. Why I stated you need a firewall is to keep the computer protect from unauthorized user...

Words: 761 - Pages: 4

Premium Essay

It/244 Week 1

...Date: 04/18/2012 1. Introduction Due in Week One: Give an overview of the company and the security goals to be achieved. 1.1. Company overview As relates to your selected scenario, give a brief 100- to 200-word overview of the company. The Company I have chosen is, The Bloom Design Group. The Bloom Design Groups mission is to provide online interior design services to its customers. The company offers their customers interior design services. What sets this company apart from others is that they have a website that allows customers a chance to design and decorate their rooms to their liking in a virtual environment before spending their money. The option provided for their customers is a virtual decorating tool. With this tool customers can play around with various color schemes for each room’s floor and ceilings, as well as customizing furniture as well. Then employees are able to access the corporate network through a VPN collection to access their client files, in order to place electronic orders for the design materials and furniture. 1.2. Security policy overview Of the different types of security policies—program-level, program-framework, Issue-specific, and system-specific—briefly cover which type is appropriate to your selected business scenario and why. Program-Framework security policy is the best overall for this type of company. As The Bloom Design Groups network stands right now it is at a high risk for potential hackers and overall business continuity....

Words: 924 - Pages: 4