Question

In: Computer Science

An organization has the following password policies: - password must be at least 16 characters long...

An organization has the following password policies:

- password must be at least 16 characters long

- three failed login attempts will lock the account for 5 minutes

- password must have one uppercase letter, one lowercase letter, and one non alphanumeric symbol

a database server was recently breached, and the incident Response Team suspect the passwords were compromised. Users with permission on the database server were forced to change their passwords for that server. Unauthorised and suspicious logins are now being detected on the same server. Which of the following is the most likely issue, that should be done?

  1. users have reset their account to a previously used password, Implement a password history policy

  2. service accounts are being used to log on to the server, restrict service account permissions to read/ write

  3. single sign-on is allowing remote login to the database server, disable single sign-on until it can be properly configured

  4. users are logged in after work hours, Implement time of day restrictions for the database servers

Solutions

Expert Solution

Single sign-on is allowing remote login to the database server, disable single sign-on until it can be properly configured, is the issue, that should be done.

Database Server is designed to be a secure database platform, but using the default settings leaves security gaps in the system. Moreover, database server has many security features you should configure individually to improve security.

If an attacker gets your password, he can access your account.So to keep your login safe, you need to set some “security questions” before you can reset your password and gets sent to a server (just used on your computer to encrypt the database)

1) Single sign-on (SSO) is a user authentication service that permits/allows a user to use one set of login credentials.

Lets take an example: a name and password to access multiple applications. SSO can be used by enterprises, smaller organizations and individuals so it would get easier to manage the various usernames and passwords.

2) Single sign-on is a federated identity management (FIM) arrangement, and the use of such a system is sometimes called identity federation.

3) OAuth (Open Authorization) pronounced as "oh-auth," is the framework that enables an end user's account information to be used by third-party services, such as Facebook, without exposing the user's password.

4) An attacker who gains control over a user's SSO credentials will be granted to access every application that user has rights to use. In order to avoid malicious access, it's essential that every aspect of SSO implementation be coupled with identity governance.

5) To improve security,organizations can also use two-factor authentication (2FA) or multifactor authentication (MFA) with SSO .

6) Although social single sign-on is convenience to users, but it can present security risks because it creates a single point of failure that can be exploited by attackers.

7) It has been recommend by many security professionals that end users refrain/avoid from using social SSO services altogether because, once an attacker gains control over a user's SSO credentials, they will be able to access all other applications that use the same credentials.

Advantages of SSO :

  • It enables users to remember and manage fewer passwords and usernames for each application.
  • No need to re-enter passwords for using applications.
  • It lessens the chance of phishing.
  • It leads to fewer complaints or trouble about passwords for IT help desks.

Disadvantages of SSO :

  • It does not provides certain levels of security for each application sign-on may need.
  • If unauthorized users gain access, then they could gain access to more than one application.

Related Solutions

at a certain company, password must be formed 3-5 characters long and composed of the 26...
at a certain company, password must be formed 3-5 characters long and composed of the 26 letters of the alphabet, 10 digits 0-9, and 14 symbols. A. how many passwords are possible if repetition is allowed? B. what is the probability that a password chosen has at least 1 repeated character.
An online account password for a certain website consists of eight characters, where at least one...
An online account password for a certain website consists of eight characters, where at least one must be a digit (i.e. a number from 0-9). a. How many different passwords are possible if only lowercase letters and digits can be used? b. How many different passwords are possible if a user wants to include single capital letter somewhere in their password? c. If a computer program randomly generates eight characters (such that each could be either a digit or any...
Given the following password generator: ● |Σ| = 94 (the printable characters on a US keyboard)...
Given the following password generator: ● |Σ| = 94 (the printable characters on a US keyboard) ● |k| = 7 ● Assume that the password generated is a random arrangement of k characters from Σ a) What is the entropy of a password generated by this system (show your work)? b) Assume an attacker has the hash and seed for a password generated by this system. The attacker also has a computer that can generate 1010 hashes per second. How...
A website has the following policy for creating a password: • Passwords must be exactly 8...
A website has the following policy for creating a password: • Passwords must be exactly 8 characters in length. • Passwords must include at least one letter (a-z, A-Z) or supported special character (@, #, $ only). All letters are case-sensitive. • Passwords must include at least one number (0-9). • Passwords cannot contain spaces or unsupported special characters According to this policy, how many possible passwords are available? (Round to the nearest trillion)
How many passwords are possible? Passwords must: be more than 8 characters long but no more...
How many passwords are possible? Passwords must: be more than 8 characters long but no more than 30 Use lower case, upper case, a number, and a special character [like ~ ! @ # $ % ^ & * ( ) _ + = ? > < . , / ] A mathematical expression is fine. What kind of PMF will be used?
Information security policies are the core internal guidance for an organization and must be enacted prior...
Information security policies are the core internal guidance for an organization and must be enacted prior to the purchase of information security controls. There is a bit of a "chicken and egg" dispute in the information security community as to whether it is appropriate to first engage in risk assessment with policies created to address those findings or whether it is appropriate to first create policies against which a risk assessment can be performed. On a more granular level, security...
1. To have long term effects on the economy, monetary and fiscal policies must A. alter...
1. To have long term effects on the economy, monetary and fiscal policies must A. alter short-run aggregate supply b. alter short-run aggregate demand c. affect the level of potential output d. smooth fluctuations in economic activity over the business cycles e. none of the above 2. which of the following might contribute to increase per capita income in the long run a. government expenditure on health and education b. government expenditure on infrastructure c. a reduction in sales tax...
Economics Chapter 16 1. The long-run Phillips curve: suggests that policies have little effect on the...
Economics Chapter 16 1. The long-run Phillips curve: suggests that policies have little effect on the natural rate of unemployment in the long run. depicts the negative relationship between the unemployment rate and the inflation rate. explains how expansionary policies can affect an economy, while contractionary policies have little effect. shows the positive relationship between the unemployment rate and the inflation rate. 2. Which statement accurately describes disinflation? It is a reduction of the inflation. It must be accompanied by...
Ethernet (10Mbps) frames must be at least 64 bytes (512 bits) long to ensure that the...
Ethernet (10Mbps) frames must be at least 64 bytes (512 bits) long to ensure that the transmitter is still going in the event of a collision at the far end of the cable. Fast Ethernet (100Mbps) has the same 64-byte minimum frame size but can get the bits out ten times faster. How is it possible to maintain the same minimum frame size?
Name 5 Foreign policies that impact the US that has been in place for at least...
Name 5 Foreign policies that impact the US that has been in place for at least 5 years.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT