Question: Computer Security 5). Classify the following proposed passwords as good choices or poor choices, and justify your reasoning a. Mary b. go2work c. cat&dog d.
Computer Security
5). Classify the following proposed passwords as good choices or poor choices, and justify your reasoning
a. Mary
b. go2work
c. cat&dog
d. 3.1515pi
6). If password aging is based on previous passwords, why should those previous passwords not be stored in the clear disk?
7). The program su enables a UNIX user to access another user's account. Unless the first user is the superuser, su requires that the password of the second user given. A (possibly aprocyphal) version of su would ask for the user's password and, if it could not determine if the password was correct because the password file could not be opended, immediately grant superuser access so that the user could fix the problem. Discuss which of the design principles this approach meets, and which one violates.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
