(3) The recipient uses the credential to verify the sender truly sent the request.
(4) If yes, the recipient processes the request. If no, the recipient rejects the request and responds accordingly
In this topic I also learn how to choosing a good password and techniques for guessing passwords. Criteria to choose password is the password must hard to guess but easy o remember. The characteristics of good password are not shorter than six characters and mix all of the character. There are many techniques for guessing passwords which is you try default password, you also can all short words, 1 to 3 characters long, you also can collect all information about the user like date of birth, hobbies, family name, plat number and so on. You also can use a Trojan horse to guessing passwords.
LAB 2 (21 July 2009)
The topic of this lab is The Goal of Information Technology Security. End of this section i must know what is information tecnology security goals. I also must know how to determine if partition is NTFS or FAT32. I must implementing confidentiality, integrity and availability in Windows Server 2003.
Information technology security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction. The goals of information technology security are Confidentiality, Integrity and Availability. Confidentiality provides protection to computer related assets from being used by unauthorized user. Integrity ensures data can be modified by authorized parties and by authorized mechanism only. Availability makes sure authorized user can access information at any time without any failure.
The relationship between the three goals.
No comments:
Post a Comment