Managing Passwords

Most computer systems are accessed by a combination of User ID and Password. This topic discusses the management of passwords from an administrator's perspective.

Techniques for devising effective passwords and their uses are explained in Choosing Passwords and Use and Best Practice.

To view the related Policy click      

 

  • Password allocation via the System Administrator or other technical staff can compromise access control, during which time unauthorised access may take place. This will be an unacceptable risk for highly sensitive systems.

There are 2 Key Actions providing safeguards against this Information Security Issue. These are available in the registered version of RUSecure™.

 

  • Passwords that are shared may allow unauthorised access to your information systems.

There are multiple Key Actions providing safeguards against this Information Security Issue. These are available in the registered version of RUSecure™.

 

  • Users who need to access multiple systems may keep a hand written note of the different passwords - e.g. in a diary - especially where they are changed frequently. Such insecure records make an easy target for ill-intentioned persons wishing to break into the system.

There are 2 Key Actions providing safeguards against this Information Security Issue. These are available in the registered version of RUSecure™.

 

Previous PageTop of this pageNext Page


Information Security Policies from US$595

 From
 US$595

Use of the guidance contained within RUSecure™ is subject to the End User Licence Agreement
This site created with EasyHTMLHelp(tm) for MS Word

 

Next PageUpPrevious Page