Question: Computer Security 5). Classify the following proposed passwords as good choices or poor choices, and justify your reasoning a. Mary b. go2work c. cat&dog d.

Computer Security

5). Classify the following proposed passwords as good choices or poor choices, and justify your reasoning

a. Mary

b. go2work

c. cat&dog

d. 3.1515pi

6). If password aging is based on previous passwords, why should those previous passwords not be stored in the clear disk?

7). The program su enables a UNIX user to access another user's account. Unless the first user is the superuser, su requires that the password of the second user given. A (possibly aprocyphal) version of su would ask for the user's password and, if it could not determine if the password was correct because the password file could not be opended, immediately grant superuser access so that the user could fix the problem. Discuss which of the design principles this approach meets, and which one violates.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!