11.07.2015 Views

Summary

Summary

Summary

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 9: Fundamental Security 13Figure 9-4Secured ConnectionNetwork logins provide a means of logging activity on the network and either preventing orallowing access to resources. This makes it possible to determine what resources are beingaccessed. Usually, the system administrator defines a naming convention for the usernameswhen creating network logins. A common example of a username is the person’s first initialand last name. You should keep the username naming convention simple so that people donot have a hard time remembering it.When passwords are assigned, the level of password control should match the level of protectionrequired. A good security policy should be strictly enforced and should include, butnot be limited to, the following rules:■■■■Passwords should expire after a specific period of time.Passwords should contain a mixture of numbers, special characters, and uppercase andlowercase letters so that they cannot easily be broken. They should have a minimum ofeight characters.Users should not write down passwords and leave them where anyone can find them.Rules about password expiration and lockout should be defined. Lockout rules applywhen an unsuccessful attempt has been made to access the system or when a specificchange has been detected in the system configuration.To simplify the process of administering security, it is common to assign users to groupsand then assign groups to resources. This allows you to easily change the access level ofusers on a network by assigning the users to or removing them from various groups. This isuseful when setting up temporary accounts for visiting workers or consultants, giving youthe ability to limit access to resources.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!