.

Friday, January 3, 2014

Information And Technology Literacy Phase 1(a)

Running Head : USERNAME AND PASSWORD Username and tidingsWhy do we need our countersignature be secret[Name of Author][Affiliation of author]Username and battle crys are habitd to doorway hush-hush instruction in the net are of great support because the both would dis entirelyow unauthorized viewing and or modify of the selective tuition contained in a certain nett site Usernames and watchwords drift that the current user is supposedly the corporeal owner of that fib . The correct parole for a username is historic to be unplowed secret by its owner in that he has the exactly objurgate to view and do proceeding in his accountCindy should therefrom be aware that Janie should non know her password If ever Janie would know her password , because all the selective information contained in her account could be adva nceed by Janie eve without her fancy and at any time she wishes to . Janie could hence view all the confidential matters contained in Cindy s account and worse , Janie may as well efface non just only one department barely even all of Cindy s info . Janie then has in like manner the countenance to change the password of Cindy s account thus dingy the current owner to access the informationAssuming that Janie is a close familiarity of Cindy and she has extravagantly trust on her , if Cindy would give her password to her help , Janie then has the same privilege to access Cindy s account . though it is not advisable to share soulfulness s password , it is clean plus in the sense that if someone has your needed data , then you have the privilege to access it . Cindy would not then be required to go to Janie s house so as Janie could access a roll they both need scarce Janie raise dressed t have .

She can then access Cindy s account every(prenominal) time she needs unless Cindy changed her passwordUsername and passwords are of wide use directly not only in the net exactly also to other means of storing data such as in the case of ATM Cards computers and cell phones . If Cindy has eminent regards of her data s confidentiality , then she would never dare to give her password even to her closest friendCommonly , passwords are advised to be the combination of n-characters that is not easily guessed . This is to ensure that no one could someone s data by trying several guesses until he would rent the right combinationReferencesPassword Security FAQ (2007Regent UniversityRetrieved October 6 , 2007 fromHYPERLINK http /network .regent .edu /it /helpdesk / muniment /password .cfm http /www .reg ent .edu /it /helpdesk /document /password .cfmEC Login : usernames and passwords for everyone (2006SOAPPLAB AucklandRetrieved October 6 , 2007 fromHYPERLINK http /www .soapplab .auckland .ac .nz /info /networking /eclogin .htm http /www .soapplab .auckland .ac .nz /info /networking /eclogin .htmPAGEUsername and Password page PAGE \ MERGEFORMAT 2Username and Password Page PAGE \ MERGEFORMAT 1...If you want to get a full essay, wander it on our website: OrderEssay.net

If you want to get a full information about our service, visit our page: write my essay

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.