13.07.2015 Views

6\VWHP $GPLQLVWUDWLRQ 0DGH (DV\

6\VWHP $GPLQLVWUDWLRQ 0DGH (DV\

6\VWHP $GPLQLVWUDWLRQ 0DGH (DV\

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 7: Scheduled Quarterly TasksOtherTask Where Procedure Check off/InitialCheck maintenance contactsCheck for expirationdate.Check for usagechanges.Problem Action ResolutionIn chapters 4-8, we have included a list of transactions like the ones below. This list containsbasic information about the transactions in the checklist. For additional information on thesetransactions, see the chapter referenced in each checklist.There are security parameters for the user’s password (for example, the minimum passwordlength, the time interval that the user must change their password, and so on).The following is a list of the most important password parameters: Minimum password length: login/min_password_lngA longer password is more difficult to break or guess. The standard for many companies is five (5) characters. Password expiration time: login/password_expiration_timeThis is the length of time before the user must change their password. The length of time that auditors recommend is thirty (30) days. The maximum that should be used is ninety (90) days. Password lockout: login/fails_to_user_lockThis parameter locks out users after attempting to log in with an invalid password for adefined number of times. The standard is to lock a user after three (3) failed attempts.7–4Release 4.6A/B

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!