preview

Nt2580 Final Project Essay examples

Good Essays

Nt2580 Final Project
Richman Investments |
Richman Internet Infrastructure Security Management Upgrade |
ITT Technical Institute NT2580 Course Project |

Based on the premises that Richman has 5000 employees throughout the main office and several branch offices, this document dictates research solutions and details the appropriate access controls including policies, standards, and procedures that define who users are, what they can do, which resources they can access, and which operations they can perform on a system. |
Final Project
I. Richman Internet Infrastructure Security Management Upgrade
A. Purpose
Based on the premises that Richman has 5000 employees throughout the main office and several branch offices, this document dictates …show more content…

This will be taught to all Richman users by corporate video training followed by password reset script for users to change their passwords to the new method. SFSP works on a three part method.
a. Input Rules are static procedures dictating where certain information is to be typed
b. Secret Code is a static number that a user secretly chooses that is easy to remember.
c. Memory Cue is a an easy to remember word the user secretly selects
2. This is an example of the new password method for Richman employees. You can make as many input rules as the company deems necessary. For this password example there are two rules. The static number is the first number before the rule changes the number. The memory cue is the easy to remember word.
a. R1 = Add doubling numbers in between each character of simple word, before, through and after
R2 = Insert the special character “*” (not including quotes) as the first and last character, as the last step in creating the password
b. Secret Code number is 1
c. Memory Cue is internet
d. New Password is *1i2n4t8e16n32e64t128*
e. Memory Cue is oranges
f. New Password is *1o2r4a8n16g32e64s128*
C. Permissions and Rights (What they can do. . Which operations they can perform on a system.)
All users will be reviewed to insure they are set up correctly with their user rights and permissions. The Administrator will review and updates roles and objects to insure each user has

Get Access