Explain the weaknesses of the current approach

Assignment Help Computer Engineering
Reference no: EM132294304

Assignment: Across the web are thousands of sites with varying levels of password complexity requirements. As we know, the suggested password recommendations from NIST and other governments have been updated recently to reflect a better understanding of how people use passwords, and how to create usable, strong passwords. Your assignment is to act as a security consultant to the fictional company of ACME, Inc. You have been brought in to address issues of authentication inside the organization.

Currently the company requires 8 character passwords rotated every 30 days. The company currently has no multi-factor authentication option.

Your assignment is to choose one component of recommended authentication practice and present a persuasive presentation to convince executives at the company to adopt your recommendation. Your presentation should include the following components:

• Risks of the current policy (make some assumptions here if you have to. If you have previous employment experience, assume this company uses the same policy as your previous company. State what the policy is). Explain the weaknesses of the current approach.

• Description of your recommended solution: specific product recommendations, including costs if applicable.

• Costs and benefits of your proposed solution. Include a qualitative or quantitative risk analysis.

• Sources: When you make claims about security (which you should), back them up with sources.

Make sure you check out the content from Week 12 Videos before starting the assignment.

Potential topics

• Multifactor authentication

• Enterprise password managers

• Password policy

• Other related ideas

Deliverable: A 10-minute presentation (slides and presentation notes). You do not need to record the presentation, but your presentation materials should be complete with notes so that someone (like me) who is familiar with authentication security could give your presentation for you.

Reference no: EM132294304

Questions Cloud

What you have learned to your professional lives : In this discussion question you have the opportunity to be creative and to relate what you have learned to your professional lives.
Identify the common purpose of attacks : Identify the common purpose of attacks on point-of-sale (POS) systems. Assess why and how these POS systems have become a prime target for hacking groups.
Analyze the community health nurse in public health setting : Analyze the community health nurse in a public health setting and list and describe the different roles".
What information is pertinent to your clients case : She has a 7-year history of respiratory illness, which occurs several times throughout the year, not seemingly connected to the changes in season.
Explain the weaknesses of the current approach : Risks of the current policy (make some assumptions here if you have to. If you have previous employment experience, assume this company uses the same policy.
List the anti-trust court cases mentioned by the panel : List the anti-trust court cases mentioned by the panel. Describe the competition issue related to each court case mentioned in this video.
Identify and cite one federal statute : Please identify and cite one federal statute which influences commerce on the internet and summarize (in not less than 100 words) what that statute accomplishes
What is an example of a managers salary package : At the time of this article, what is the current value of the stock? What has been the increase in value since 2005?
Where within the case did you discover the information : Based on your reading of the case, provide a brief, one sentence summary of what you know about each of the things on your list.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd