Friday, January 25, 2013

Information And Technology Literacy Phase 1(a)

Running Head : USERNAME AND PASSWORD Username and tidingsWhy do we need our Password be secret[Name of Author][Affiliation of author]Username and battle crys are used to doorway cloak-and-dagger instruction in the net are of great help because the both would disallow unauthorized viewing and or editing of the selective information contained in a certain web site Usernames and passwords drift that the current user is supposedly the real owner of that fib . The correct password for a username is important to be unplowed secret by its owner in that he has the exactly objurgate to view and do transactions in his accountCindy should therefrom be aware that Janie should non know her password If ever Janie would know her password , because all the selective information contained in her account could be accessed by Janie eve without her consent and at any time she wishes to . Janie could then view all the confidential matters contained in Cindy s account and worse , Janie may as well efface non just only one part barely even all of Cindy s info . Janie then has also the countenance to change the password of Cindy s account thus forbidding the current owner to access the dataAssuming that Janie is a close friend of Cindy and she has extravagantly trust on her , if Cindy would give her password to her friend , Janie then has the same privilege to access Cindy s account . Though it is not advisable to share someone s password , it is somewhat plus in the sense that if someone has your needed data , then you have the privilege to access it . Cindy would not then be required to go to Janie s house so as Janie could access a roll they both need but Janie get dressed t have .
Ordercustompaper.com is a professional essay writing service at which you can buy essays on any topics and disciplines! All custom essays are written by professional writers!
She can then access Cindy s account every(prenominal) time she needs unless Cindy changed her passwordUsername and passwords are of wide use directly not only in the net but also to other means of storing data such as in the case of ATM Cards computers and cell phones . If Cindy has high regards of her data s confidentiality , then she would never dare to give her password even to her closest friendCommonly , passwords are advised to be the combination of n-characters that is not easily guessed . This is to ensure that no one could someone s data by trying several guesses until he would get the right combinationReferencesPassword Security FAQ (2007Regent UniversityRetrieved October 6 , 2007 fromHYPERLINK http /network .regent .edu /it /helpdesk /document /password .cfm http /www .regent .edu /it /helpdesk /document /password .cfmEC Login : usernames and passwords for everyone (2006SOAPPLAB AucklandRetrieved October 6 , 2007 fromHYPERLINK http /www .soapplab .auckland .ac .nz /info /networking /eclogin .htm http /www .soapplab .auckland .ac .nz /info /networking /eclogin .htmPAGEUsername and Password rapscallion PAGE MERGEFORMAT 2Username and Password Page PAGE MERGEFORMAT 1...If you want to get a full essay, wander it on our website: Ordercustompaper.com

If you want to get a full essay, wisit our page: write my paper

No comments:

Post a Comment