Assignment 5- Cipher Techniques and Authentication
Discussion Questions
- (DUE September 27, 2005 by midnight EDT) Briefly discuss what you learned from the readings in chapters 10-11:
- What was the most surprising thing you learned?
- What was the most difficult part for you?
- (DUE September 27, 2005 by midnight EDT) Select one of the following questions to discuss in detail through the threaded discussion.
- The university is discussing a change in password policy that would require all passwords be changed every 45 days. Currently at CSU, only our Novell login password needs to be changed every 45 days. Many of us use four or five passwords in our daily activities. At lunch this week, several of us were discussing this issue. Several faculty stated that "in the old days", they had one randomly generated password that never changed and that "was good enough." Present a convincing argument for either making or not making this change to the password policy.
- A computer system uses biometrics to authenticate users. Discuss ways in which an attacker might try and spoof the system.
- Discussing authentication systems, especially passwords always generates lots of discussion. Describe your ideal password policy.
- (DUE Oct. 2, 2005 by midnight EDT) Select a discussion from one or more of your classmates and respond to their comments.
Click here to return to Wayne's World's homepage:
written by Wayne Summers summers_wayne@ColumbusState.edu