StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Password Management Protocol - Assignment Example

Cite this document
Summary
Password Management Protocol used to make secure verification (authentication) through proper utilization of several combined aspects to authenticate the identity of the person/entity longing to get right of entry (access) to the assets of the Information Technology equipments/resources…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful
Password Management Protocol
Read Text Preview

Extract of sample "Password Management Protocol"

Download file to see previous pages

Information Technology infrastructure can be protected through diverse authentication techniques such as username and password combination, biometric fingerprint or hand scanning recognition or usage of smartcards for identification. After proper authentication, the next step is to identify the number/level of operations the logged in person can perform (access control/level). This function can be performed by developed Access Control Mechanism (ACM) with help of identified Access Control List (ACL) or Access Control database.

It is pertinent to mention here that the human involvement is the weakest factor for secure systems developed with appropriate information security standards. Microsoft Outlook has its own Password Management Protocol that allows users to login the MS Outlook after providing the correct password. It stores usernames and the password associated with it, on the Microsoft Exchange Server as well as client’s personal computer. One of the major weaknesses of password management protocol of MS Outlook is that its password can easily be hacked by a plenty of software available over the internet through password secured Personal Storage Files (*.pst file) used by MS Outlook.

All passwords could be recovered easily and instantly, despite of the password’s length. . Furthermore, the protocol also allows similar and shared passwords to apply on MS Outlook account. This enhances vulnerability of password broken into the MS Outlook account through guess. References Lowe, Gavin. 2004. Analysing protocols subject to guessing attacks. Journal of Computer Security. Bloomberg, L., Paul. 2010. Passwords security protocols. Available at: http://www.zdnet.com/blog/service-oriented/passwords-security-protocols-cost-more-than-they-save-says-microsoft-researcher/4492 [Accessed 14 July 2012] Informer, I.

, Technologies. 2012. Microsoft Outlook Password Management Protocol Software. Available at: http://microsoft1.software.informer.com/download-microsoft-outlook-password-management-protocol/ [Accessed 14 July 2012] Generally, Byzantine Agreement is fundamental problem in distributed computing that engages a structure of n processes from which t number of processes may possibly be faulty. The faulty processes are a collection of processes that include from simple crashed processes to the processes which also misleads the good processes into disagreement.

The proper processes need to concur on a binary value propelled by a spreader that is from the n processes. If the spreader propels the identical value to all processes, subsequently each accurate process has to agree on the spread value and in either case the processes have to agree on some value. More unambiguously, Byzantine Agreement is accomplished only after fulfilling the following conditions: i. All appropriately working processes agree on the same value, and ii. If the transmitter functions accurately, afterward each and every accurately functioning process agrees on its value.

The transmitters

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Password Management Protocol Assignment Example | Topics and Well Written Essays - 750 words”, n.d.)
Password Management Protocol Assignment Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1454516-week
(Password Management Protocol Assignment Example | Topics and Well Written Essays - 750 Words)
Password Management Protocol Assignment Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1454516-week.
“Password Management Protocol Assignment Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1454516-week.
  • Cited: 0 times

CHECK THESE SAMPLES OF Password Management Protocol

How to Prevent Illegal Access to Personal Data

he above design will not allow users to select an easy password like MS Outlook's Password Management Protocol.... A traditional password system is simple but not reliable, encryption, cryptography, are too complicated for a wide audience.... hellip; A traditional password verification system inquires the user for provision of a surreptitious sequence of characters (password) to ensure that a right person/user is getting access to his personal system....
1 Pages (250 words) Assignment

Authentication of the Modern Generation

More and more online self-service applications and an increasingly complex learning environment require such systems to be based on a single ID and password.... The author states that the basic challenge of the coming decade is how to make already available technologies as useful and friendly to the common man....
7 Pages (1750 words) Term Paper

Computer Network and Management

Therefore, all segments highlighted with red background in the above table would most probably experience premature timeout. Web Cache, also called Proxy Cache, is a shared… ork device that reduces server load, bandwidth utilization and delays in data transmission between network nodes by storing (caching) copies of web content (e....
28 Pages (7000 words) Case Study

One Time Passwords

Originally based on S/KEY, a seminal OTP system developed at Bellcore, OTP (One-time password) technology is a system that requires a new password every time a user authenticates.... This basic principle of an OTP solution effectively protects the system against replay attacks, or… ny attack that attempts to use an intercepted password, hence, making it difficult for potential intruders to gain unauthorized access to the system (Bhaiji, 2009). Mathematical algorithm: In this type, the system requires an initial seed (PIN or pass phrase) to generate The new passwords are generated by the system using a one-way hash function (Bhaiji, 2009)....
5 Pages (1250 words) Research Paper

Network Configurations

he Secure Shell otherwise known as SSH is a secure network protocol for the Cisco devices compared to telnet.... These protocols are used to prevent those that are not supposed to access the out-of-band management ports.... One can also opt to use password Manager Pro which provides a centralized repository for that stores alt of passwords securely and facilitates easy administration (Ohio, 2011)....
2 Pages (500 words) Essay

Password Management Protocol vulnerabilities

Password Management Protocol vulnerabilities By of the affiliation Department's Paper's Password is one thing that can prevent other users from accessing various accounts networks and what is very important all kinds of confidential information.... e will analyze the password storage protocol used in the browser like Google Chrome, Opera, Firefox Mozilla, Seamonkey.... password is one thing that can prevent other users from accessing various accounts networks and what is very important all kinds of confidential information....
2 Pages (500 words) Essay

Nuclear Plant Password Policy

They include confidentiality, integrity, and privilege management.... This is an example of: Privilege management Activity 1-31) Brian works at a bank.... Once an identity is, the system checks and confirms that the user allowed leaving the lobby and entering the facility, and the Nuclear Plant password Policy Insert Insert Activity 1 As an information officer, what are the information security goals that you need to keep in mind while defining the protection you shall need?...
4 Pages (1000 words) Essay

Performance and Security of Windows Server

The paper 'Performance and Security of Windows Server' presents Windows Server 2003 which is the next generation of server operating systems.... It is more scalable and delivers better performance as compared with previous server products from Microsoft.... hellip; By default, the server components of Windows Server 2003 are disabled for security purposes....
8 Pages (2000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us