What are you defences? If someone uses a dictionary attack- trying all passwords from a dictionary, exhaustive search- trying all possible combinations, or intelligent search - trying passwords that are associated with user's attributes. To bypass your system password according to (Gollmann, D. 2011 p.51-53).
3.1 Answer
The defences are to change default passwords, passwords that are given to you when an system are delivered and come with a default password. Make sure that the password has a good length to prevent lower the chances for an exhaustive search. Use formats available on the your keyboard such as upper- and lower case letters and include numbers and other non alphabetical symbols. Avoid obvious passwords such names, …show more content…
Question
How can information systems further help to improve password security according Dieter? (Gollmann, D. 2011 p.52-53).
4.1 Answer
The information systems sets up different requirements for how a password should be designed with help of checking words from dictionaries, checking its length or using a password generator with different implemented defences to minimize the risk for an attacker to guess the password (Gollmann, D. 2011).
Once passwords are created the system can restrict login attempts to lock user accounts completely or under a certain time to prevent further attempts of guessing the password. The system can set expiry dates on passwords forcing users to change them regularly to update the passwords until their old passwords are accepted again (Gollmann, D. 2011).
4.2 Grade
An A answer for this question is one that the language, style and the answers structure are well adapted to the questions purpose. The answer is the same as in the literature the question is based on. The answer should be a summary from the literature. The answer gives an indirect idea to readers of how the defences are implemented on day to day systems according to the literature. The answer grade would lower if the answer didnt specific say