Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Q1)Making Passwords Compliant: You are an administrator at the Contoso Corporati

ID: 3679258 • Letter: Q

Question

Q1)Making Passwords Compliant: You are an administrator at the Contoso Corporation. You have the responsibility to make sure that the passwords for all users are at least eight characters and that are changed every 90 days. You must ensure that each password is a strong password. You also have users who are on the road. Because these users use laptops that contain confidential information, you must ensure that each password is 10 characters and that get changed every 30 days. What should you do? Q2 Preventing Intrusion: Recently, you have had a couple accounts where the password has been compromised. You need to take extra steps in preventing the intrusion. What are the steps you can take? can any one help me out with these questions in detail like around 3pages of info i want?

Explanation / Answer

Answer 1: For inforcing these changes there are various tools that can help the administrator in different ways. These tools are given below:

1. LDAP: With the help of this you can set various range of passwords , this can include password of 8 or 10 lenght with combinations of letters and numbers.

2. Active Directory: In this we have a Group policy objects that prevent users to setting last 10 or 20 used passwords and provide flexibility to set passwords for different groups.

These both above tools and also be used with in the combination.

Answer 2: The various extra steps that can be taken in preventing intrusion is given below:

1. We can inforce the policy that insure to lock the account if we found such type of intrusion from any account.

2. We can ue a best antivirus and keep it updated in all the system, that can detect and remove the malware and trojans that can do the intrusion of passwords.

3. Inforce policies that asks system users to keep on changing the system passwords time to time.

4. Impose various symmetric and asymmetric encryption algorithm to store system passwords in encrypted format.