12.07.2015 Views

Reference Manual - Videx, Inc.

Reference Manual - Videx, Inc.

Reference Manual - Videx, Inc.

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Access Code SourceAccess codes are the first line of security in CyberLocks. They must be programmed intoCyberLocks using a Grand Master CyberKey or a CyberLock Programmer. Sometimes calledfamily codes, a CyberKey must present one of the access codes in the lock to open it.In the event a system is destroyed because of a loss of computer equipment or other disaster, asystem may be reconstructed using the same access codes. Without those access codes, it isimpossible to rebuild a system.<strong>Manual</strong> Password Entry - This option uses manually entered passwords as the source for theaccess codes. Each password must be 6 to 32 characters. Select passwords that will be difficult toguess. Use a word or phrase that is easily remembered. Avoid using personal names, familynames, company names, dates of birth, Social Security Numbers, etc. A good password includes amixture of upper- and lower-case letters, punctuation, and numbers. An often used example is"All4One." This phrase would be easy to remember, yet still involves both upper- and lower-caseletters and numbers.<strong>Manual</strong>ly entered passwords should be written down and stored in a secure location. If they arecompromised the security of the CyberLock system is compromised as well.<strong>Manual</strong>ly entered passwords enable the system to create and utilize a reset key.Grand Master CyberKey - Grand Master CyberKeys are manufactured with built-in access codes.With trillions of possible codes, these access codes are nearly certain to be unique. When a GrandMaster is used as the source for access codes CyberAudit-Web designates it as the "Base"Grand Master.A "Base" Grand Master should be kept in a secure location when not in use. It may be used torebuild a system if the database is destroyed. If the "Base" Grand Master is lost, it should bedesignated as "lost;" in CyberAudit-Web and replaced with another. This will ensure that no onemay use it to create keys to open the CyberLocks.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!