11-1 Flashcards
policies regarding how many login attempts should be allowed before the account is locked
access lockout policies
a policy in which the company provides te device and has complete control over it
COPE (Company Owned and Provided Equipment)
A policy of permitting employees to bring personally owned devices to their workplace and to use those devices to access privileged company information and applications
BYOD (Bring Your Own Device)
a policy wherin the company allows the employees to bring their own device but only if that device is from a list of preapproved devices
CYOD (Choose Your Own Device)
a table that contains all the possible hashes of all the key combinations that might have been used in a password up to a given size.
Rainbow Table
good user policies outline specifically how people may or may not use __________
systems.
every organization must have specific policies that will be applied _______ across the organization
fairly
areas of potential misuse are also covered by user policies, including
password sharing,
copying data,
leaving accounts on while employees go to lunch,
etc
a good password has been defined as one with 6 - 8 ________, uses numbers and special characters, with no obvious relevance to the __________
characters // end user.
it is also uncommon for employees to _________ passwords
share
issues such as password length, __________ are issues of administrative policies
age, history
passwords should never to be kept writen down, or shared. if a password is compromised then the user should contact __________ immediatley
IT administrator
choose a passphrase and replace all the E’s with_________ could be a good idea for a secure password. this complexity requirement helps to prevent ___________
3’s, dictionary attacks.
Hashing passwords leads to the use of an interesting technique called the ___________
rainbow table.
a user should open an attachment only if it meets the following criteria
it was expected
if its not expected, it came from an open source
appears to be legitimate