Improved technology has enabled organizations to come up with ways of limiting access to its key documents saved in the computer. It has also enabled other users to prevent access by external users. One reason for this is to prevent fraud and any manipulation of documents by both the employees and any outsiders. One method that has been used to limit the access of documents is the use of passwords. This has enabled that only the authorized employees have access to the documents of the company that have been saved in the computers.
Recently, there have been cases of users forgetting passwords that enable them to gain access to the files of the company. There has been recent debate on whether to train users to better remember passwords. This may reduce the risk of blocking the system since the employees will be able to put the correct password needed. However, this may give room for intruders who may be in a good position to make an educated guess. In addition to this, some employees may type the password in front of the customers. One good example of this case is in the supermarkets. While the customer is being served, the employee may be required to type the password and he may do this in front of the customer being served. The easy password may be noted by the customer, leading to manipulation.
The other option is to incorporate the name of the system in the password to create a complex but easy to remember password. A complex password is the most effective password since it ensures that only the authorized persons have access to the most important files of a company. We should train users to incorporate the name of the function in their passwords to prevent forgetting them. Incorporating the name of the function enables the user to create passwords that do not cause problems due to failure to remember the password. This also reduces the cost of involving the computer experts due to blocked passwords. Password blocking usually occurs when a person forgets password for more than three times. In conclusion, many companies in the global environment use this approach since it is the most effective one to safeguard the information of the companies. Finally, users should also be trained on the importance of passwords in order to create passwords that do not lead to manipulation by intruders.
Limiting Damage Essay Examples
Cite this page
Choose cite format:
- APA
- MLA
- Harvard
- Vancouver
- Chicago
- ASA
- IEEE
- AMA
WowEssays. (2019, December, 23) Limiting Damage Essay Examples. Retrieved November 02, 2024, from https://www.wowessays.com/free-samples/limiting-damage-essay-examples/
"Limiting Damage Essay Examples." WowEssays, 23 Dec. 2019, https://www.wowessays.com/free-samples/limiting-damage-essay-examples/. Accessed 02 November 2024.
WowEssays. 2019. Limiting Damage Essay Examples., viewed November 02 2024, <https://www.wowessays.com/free-samples/limiting-damage-essay-examples/>
WowEssays. Limiting Damage Essay Examples. [Internet]. December 2019. [Accessed November 02, 2024]. Available from: https://www.wowessays.com/free-samples/limiting-damage-essay-examples/
"Limiting Damage Essay Examples." WowEssays, Dec 23, 2019. Accessed November 02, 2024. https://www.wowessays.com/free-samples/limiting-damage-essay-examples/
WowEssays. 2019. "Limiting Damage Essay Examples." Free Essay Examples - WowEssays.com. Retrieved November 02, 2024. (https://www.wowessays.com/free-samples/limiting-damage-essay-examples/).
"Limiting Damage Essay Examples," Free Essay Examples - WowEssays.com, 23-Dec-2019. [Online]. Available: https://www.wowessays.com/free-samples/limiting-damage-essay-examples/. [Accessed: 02-Nov-2024].
Limiting Damage Essay Examples. Free Essay Examples - WowEssays.com. https://www.wowessays.com/free-samples/limiting-damage-essay-examples/. Published Dec 23, 2019. Accessed November 02, 2024.
Copy