Premium Essay

Nt2670 Unit 3 Assignment 1

Submitted By
Words 1203
Pages 5
Apparently many designers and developers believe secure passwords have to look complicated, even these days. The most secure ones seem to be „ #sK8/a_C%eD8)“. This looks like hell and is a mess to create. How would you explain your user, the password has to have a length of at least 8 characters, 2 characters have to be uppercase, 2 have to be special characters and of course numbers are a must?

Would you like to create such a password? I wouldn’t. Instead I would probably risk it to write down this password on a note or use the same password several times. Maybe I would use a password manager. Nothing is a really great idea. Such complex requirements for passwords are a huge problem for privacy and IT security.

But we need these passwords! At least this is, what passwordsgenerater.net wants to tell us. NO! We don’t need overly complicated passwords. This claim is idiocy. I don’t have …show more content…
So, why should you as a designer be interested in password security as the developers will give us the rules for passwords most times?
Complex passwords are hard to remember and a mess to create. This is an obstacle we don’t need to confront the user with. So, why should we? Creating an account is never something the user really likes. Therefore we shouldn’t call for more than we need.
If the user created an account despite of complex rules the next challenge starts: Entering the right password. You don’t see what you type, at least usually, so it’s pretty likely, you fail, if you also have to think about special characters, numbers and whatever. Hence probably the most often pressed button on each website is the „I forgot my password“ button. This produces real costs: It at least requires sending an email, which equals costs.
Maybe the users even will need help by your support to recover the password. As a result of this, the general service will become worse because the support has to deal with such obvious tasks even more or it will become more

Similar Documents

Premium Essay

Nt1230 Syllabus

...aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course relates to other courses in the NSA program: 1 Date: 8/31/2012 Client-Server Networking I Syllabus NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420...

Words: 1834 - Pages: 8

Premium Essay

Test

...for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure and Introduction to  ComputerLogic Networking    IS3120 IS3110 NT1210 Network  Risk Management in Introduction to General Education / General Studies NT2580 NT2799 Communications Information Technology Introduction to Information Security NSANetworking Capstone Project IS4550 NT2640 Security Policies and Implementation...

Words: 2305 - Pages: 10

Premium Essay

Student

...Lopayi Wani 06/23/15 NT2670 Email and Web Services Unit 1 Assignment 1: Installing Server Roles with a Batch File Assignment: After careful consideration, it was decided by the corporate IT team that in order to increase security and lower your attack surface, Windows 2008 Server Core would be installed on a group of your servers. However, a few roles need to be installed on the server and your Senior Administrator is not familiar with installing roles on a Server Core machine. Using Internet research and use notepad to create a batch file to install the following roles: DHCP, DNS, Print Services and Hyper-V. Students will complete a notepad file that will successfully install all of the roles mentioned. Save the file using the name Roles.bat. 1. DHCP: start /w ocsetup dhcpservercore. 2. DNS: start /w ocsetup DNS-Server-Core-Role 3. PRINT: start /ocsetup Printing_ServerCore-Role. 4. SERVICES: start /w ocsetup MediaServer, 5. HYPER- Start /ocsetup Microsoft-Hyper-V. Questions 1. What does the /w switch do? Why is it used? Specifies the warning level, an integer in the range 0 through 4. There is no space between the /W switch and the digit indicating the warning-level value. 2. What switch is used to remove a role? To remove a role you would need to commas to separate command names. 3. What is the command to start the DHCP Server service? To open DHCP, click Start, click Settings, click Control Panel, double-click Administrative...

Words: 267 - Pages: 2

Free Essay

Port Scanning

...Unit 3 Assignment 1 Choosing Port Scanning Software NT2670, James Fairchild 1. What is Port Scanning? Is a software application designed to probe a server or host for open ports. This is often used by administrators to verify security policies of their networks and by attackers to identify running services on a host with the view to compromise it. 2. What is the goal of Port Scanning? The results of a scan on a port is usually generalized into one of three categories, Open or accepted: The host sent a reply indicating that a service is listening on the port. Closed or denied or not listening: the host sent a reply indicating that connections will be denied to a port. Filtered, dropped or blocked no reply from the host. Open ports present two vulnerabilities of which administrators must be wary, Security and stability concerns associated with the programs responsible for delivering the service- open ports. Security and stability concerns associated with the operating system that is running on the host. Open or closed ports. 3. Would you prefer an open source or proprietary port scanning software? Depending on who you ask? Many people in business prefer to use proprietary software instead of open source software, due to the misconception that proprietary software is better supported than open source. After several years of supporting both open source and proprietary software it becomes clearly evident that just because you pay for proprietary software does not mean...

Words: 454 - Pages: 2

Premium Essay

Unit 4 Assignment: Smtp Security

...04/16/14 NT2670, Email and Web Unit 4 Assignment: SMTP Security 1. List and describe three SMTP server security threats? a. Viruses can erase files, cause computer crashes and destroy information or get information. b. Spam email is a term used to describe messages sent in bulk or incoming emails that are received without consent. c. Directory harvest attacks (DHAs) is an attempt to determine the valid e-mail addresses associated with an e-mail server so that they can be added to a spam database. 2. List three suggestions to harden SMTP server security? a. “Disable open relaying on all SMTP virtual servers: Open relay on your Exchange Server allows other Email servers to use your server as a gateway to others. This allows others to send spam Email which appears to be originated from your address, therefore you will be identified as a spam source.” (Ehamouda, 2009) b. “Prevent anonymous access on internal SMTP virtual servers and dedicated SMTP virtual servers for IMAP and POP clients: Because all Exchange servers within your organization authenticate with each other to send mail, you do not need to enable anonymous access on your internal Simple Mail Transfer Protocol (SMTP) virtual servers. Additionally, all Post Office Protocol (POP) and Internet Message Access Protocol (IMAP) clients authenticate with your SMTP virtual server, so anonymous access is not required on a server that is used exclusively by POP and IMAP clients.” (Ehamouda, 2009) c. “Restricting Submissions...

Words: 337 - Pages: 2

Premium Essay

Nt2640

...Networking Syllabus Where Does This Course Belong? This course is required in the associate degree program in Network Systems Administration and associate degree in Mobile Communications Technology. The following diagrams indicate how this course relates to other courses in respective programs: Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1201 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming Technology Courses General Education/ General Studies 1 Date: 7/18/2011 IP Networking Syllabus Mobile Communications Technology MC2799 MCT Capstone Project NT2640 IP Networking MC2560 Mobile Wireless Communication I MC2660 Mobile Wireless Communication II MC2665 Mobile...

Words: 2573 - Pages: 11

Premium Essay

Nt 1210

...models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming...

Words: 4400 - Pages: 18

Premium Essay

Nt1210 Introduction to Networking Onsite Course

...models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming...

Words: 4400 - Pages: 18

Premium Essay

Nothing

...this document with you each week Students are required to complete each assignment and lab in this course package on time whether or not they are in class. Late penalties will be assessed for any assignments or labs handed in past the due date. The student is responsible for replacement of the package if lost. Table of Contents Syllabus 2 Student Professional Experience 19 Graded Assignments and Exercises 23 Labs 47 Documenting your Student Professional Experience 57 ITT Technical Institute NT1310 Physical Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1210 Introduction to Networking or equivalent Course Description: This course examines industry standards and practices involving the physical components of networking technologies (such as wiring standards and practices, various media and interconnection components), networking devices and their specifications and functions. Students will practice designing physical network solutions based on appropriate capacity planning and implementing various installation, testing and troubleshooting techniques for a computer network. Where Does This Course Belong? | | | NT2799 | | | | | | | | NSA Capstone | | | | | | | Project | | | | | NT2580 | | | NT2670 | NT2640 | | PT2520 | | Introduction to | | | | | | | | | | ...

Words: 10839 - Pages: 44