Architecture Evaluation - Department of Computer Information Systems
Architecture Evaluation - Department of Computer Information Systems
Architecture Evaluation - Department of Computer Information Systems
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Intranet Security: Access<br />
Control<br />
Isolating the server<br />
physically<br />
by specific protocol<br />
by specific IP address<br />
Password access<br />
Passwords should<br />
be mixture <strong>of</strong> upper and lowercase; be <strong>of</strong> sizable length; not<br />
be words found in dictionary<br />
be changed regularly<br />
be changed from vendor supplied defaults<br />
Other password issues:<br />
passwords <strong>of</strong> ex-users should be removed<br />
no more than two invalid attempts should be allowed<br />
Enterprise <strong>Architecture</strong>s<br />
Pr<strong>of</strong>essor<br />
Truex