Tuesday, November 26, 2019
reconfiguring a network Essay
reconfiguring a network Essay reconfiguring a network Essay New User Guide & Basic Troubleshooting Guide Table of Contents Network Login and Passwords There are two separate networks on the campus, and they require separate logins. The admin network is only available in the Instructor area and admin offices. Administration To log into the admin network you will use your 1ITT email as your username. You will also be given a password to use for your initial login. Once you have successfully logged in with the initial password, you will be required to change that password. Your new password must meet the following complexity requirements: Passwords must be at least 8 characters and a maximum of 16 Must contain at least three of the following Lower-case characters: abcdefghijklmnopqrstuvqxyz Upper-case characters: ABCDEFGHIJKLMNOPQRSTUVWXYZ Numbers: 0123456789 Special Characters: !@#$%^*()-_=+;:,./?`~ Users are required to choose passwords that are difficult to guess. Password must not be easily deducible words or characters such as the userââ¬â¢s first or last name, spouseââ¬â¢s name, name of pet, a sequence of numerals or letters, or any word found in a standard English dictionary. Passwords should never be written down Users must not write down or otherwise record their passwords in readable form near the system to which the password pertains. For example, a user must not write his/her network password on a note and tape it to his/her computer. Passwords must not be written down and left in a place where others might discover it. If a password must be written down, it must be secured and far away from the system to which it pertains. In general, users must choose passwords that are challenging for others to guess but easy for them to remember, so users do not feel compelled to write down a password in order to remember it. Display and printing of passwords The display and printing of passwords must be masked, suppressed, or otherwise obscured so that unauthorized parties will not be able to observe or subsequently recover them. Electronic storage of passwords in readable form Passwords must not be stored in plain text or in other readable forms in places where unauthorized parties might recover them, including, but not limited to: batch files; login scripts; computers without access control; terminal function keys; or in software macros. Use of same password prohibited While the specific generation retention depends on the computer system, users on all systems are prohibited from re-using a password when prompted to change it by the system. Suspected disclosure forces password changes If a user suspects or knows that their password integrity has been compromised, it must be changed immediately. Password sharing prohibition Regardless of the circumstances, passwords must never be shared or revealed to anyone else besides the authorized user. To do so exposes the authorized user to responsibility for actions that the other party takes with the password. If users need to share computer resident data, they must use electronic mail, public directories on local area network servers and other authorized mechanisms as appropriate. No user should ever use another personââ¬â¢s login for any reason Limit on consecutive unsuccessful attempts to enter a password To prevent password guessing attacks, the number of consecutive attempts to enter an incorrect password must be strictly limited. After three unsuccessful attempts to enter a password, the involved user ID must be suspended for thirty minutes or until reset by a system administrator. Password Reset If you have forgotten your network password or suspect that your account has been compromised, the SST can reset your password. IRIS passwords require a Service request through the SST. IRIS password resets may take up to a day to be changed. Pinnacle password resets are handled through the Dean. Locking Unattended PCââ¬â¢s All unattended PCââ¬â¢s must be locked to
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.