Computer Science Homework Help

Strayer University Organizations and Password Authentication Risks Discussion

 

Many organizations use password-based authentication to authenticate their users. Passwords that do not meet criteria can be placed in a vulnerable state. Hackers can use password crackers to guess the passwords and infiltrate systems.

Go to Basic Search: Strayer University Online Library to locate and integrate at least two quality, academic resources (in addition to your textbook) on risks associated with password-based authentication. You may also use government websites, such as Cybersecurity from the National Institute of Standards and Technology.

Please respond to the following in a post of at least 200 words:

  • Describe the methods organizations use to address the risks associated with password-based authentication.
  • Recommend two methods you believe are the most effective in addressing these risks.
    • Be sure to justify your recommendations.
  • Provide full citations and references, formatted according to Strayer Writing Standards.
    • For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.

In 60 to 75 words, please respond to at other post below:

Hello Class and Professor. I have not had the unfortunate opportunity of working anywhere that did not enforce regular password changes and certain character criteria. If it did not happen then there wouldnt be any data breaches or need for things like GDPR or Privacy laws. One method is hashed passwords. In the book on page 315. It prevents duplicate passwords from being visible in the password file. Even if two users have the same password. There is mention of system-selected passwords.

I would do hashed passwords with salt and a pin. I guess that is multi factor but hashed passwords to address the issue. The book speaks on different methods such as a memorized secret, lookup secret, single factor cryptographic software etc.

Like I said I have never been anywhere in the last 10 years that didnt have multi-factor authentication but to justify single factor it may be a small company with a few people at a business with people that are not so tech savvy so use hashed passwords with some encryption and at least 7 character minimum withs special characters.

All of the information has come from the book on pages 330-345.