dcsimg

Find an IT Download

Enterprise Password Management Guide

Despite technical advances, the simple password remains a key factor in protecting most organizations' vital data and network. These guidelines will help you set policies for strong passwords and manage risk from careless users.


285 KB | 3 files | null DOC,null PDF

Passwords are used in many ways to protect data, systems, and networks. For example, passwords are used to authenticate users of operating systems and applications such as e-mail, labor recording, and remote access. Passwords are also used to protect files and other stored information, such as password-protecting a single compressed file, a cryptographic key, or an encrypted hard drive. In addition, passwords are often used in less visible ways; for example, a biometric device may generate a password based on a fingerprint scan, and that password is then used for authentication.

This publication provides recommendations for password management, which is the process of defining, implementing, and maintaining password policies throughout an enterprise. Effective password management reduces the risk of compromise of password-based authentication systems.

The attached Zip file includes:

  • Intro Page.doc
  • Cover Sheet and Terms.pdf
  • Enterprise Password Management Guide.pdf

Related IT DOWNLOADS

Recent IT Downloads
Building a GRC Program: Assessing Stakeholder Needs and Readiness

This table outlines the top needs of each stakeholder group that can help guide your conversat...Read More

Recent IT Downloads
Job Description: Technology Project Manager

Whether you're looking to hire one or looking for a position yourself, use this detailed job d...Read More

Recent IT Downloads
Case Studies in Strategic Planning

Chapter 1 delves into the first four stages of systematic strategic planning, including clarif...Read More