Sunday, March 24, 2019

PBL 3 - IT Network, Telecommunication Risks

Authentication: Password Management (eSecurity Vol 45, page 12)

1) Based on the article identify and list out related IT network & Telecommunication risk (at least 3)

1) Password stolen, captured, copied, guessed or forged
2) Authentication bypass
3) Brute force attack
4) Sharing password
5) Weak password recovery mechanism
6) Account lockout


2) State your opinion for countermeasure strategy to govern each risk

1) Avoid using very weak password such as ‘12345’
2) Use strong password with characteristics such as:
  • At least eight alphanumeric characters long.
  • Combination of numbers, symbols, and capital and lower-case letters.
3) Do not use obvious dictionary words and combinations of dictionary words such as “password”.
4) Make the password personal and easy to remember, but ensure that “personal” information is not available online.
5) Change the password periodically, for example once every six months.
6) Never write down, share or store passwords online.

Individual lesson learnt :
  1. Syuhadah - “Password is like our own treasure. It should be mysterious yet really valuable. Never let anyone know about your treasure. Keep it to yourself so it will always be safe. ”

  1. Amalina - “We need to make our own password unique enough as it will differ from others and make it difficult for ‘hacker’ to steal our password.”

  1. Aqilah - “Choosing a hard-to-guess but easy-to-remember password is important”

  1. Shamila - “Password is something like a door which need to be locked or secured because there’s valuable behind the door means it contains data or information”

  1. Alysha - “Password are like our life where we put important things inside and need to be secured properly so that others can’t take from us without our consent.”


Image result for risk for password

No comments:

Post a Comment