DistributedNetworks DistributedNetworks


Securing Resources   «Prev 

Securing resources with strong passwords

If a hacker obtains a valid user account and the corresponding password, he or she can bypass security mechanisms and access any resource to which the user account has been granted permission. The risk of this threat is greatly reduced by implementing proper operating system policies that enforce user-defined parameters and actions. Policies can help a user work securely, primarily because they force users to make wise choices.