Computer Science Homework Help

Computer Science Homework Help. Strayer Univeristy Authentication and Change Management Discussion

 

Many organizations use password-based authentication to authenticate their users. Passwords that do not meet criteria can be placed in a vulnerable state. Hackers can use password crackers to guess the passwords and infiltrate systems.

Go to Basic Search: Strayer University Online Library to locate and integrate at least two quality, academic resources (in addition to your textbook) on risks associated with password-based authentication. You may also use government websites, such as Cybersecurity from the National Institute of Standards and Technology.

Please respond to the following in a post of at least 200 words:

  • Describe the methods organizations use to address the      risks associated with password-based authentication.
  • Recommend two methods you believe are the most      effective in addressing these risks.
    • Be sure to justify your recommendations.

Cybersecurity is critical to protecting an organization’s infrastructure. Even within the cybersecurity field, several people may be responsible for ensuring an organization’s infrastructure is protected.

Go to Basic Search: Strayer University Online Library to locate and integrate at least two quality, academic resources (in addition to your textbook) on how to apply change management principles to infrastructure protection. You may also use government websites, such as Cybersecurity from the National Institute of Standards and Technology.

Please respond to the following in a post of at least 200 words:

  • Explain the purpose of change management and how it      applies to infrastructure protection.
  • Describe the methods organizations use to determine      whether changes have been made to the infrastructure.
  • Outline the process to be followed prior to integrating      any changes into a production environment.

Computer Science Homework Help