Some sensitive computer systems are particularly attractive to cyber criminals. Passwords may be used as one element of restricting access to legitimate users, but the password systems should be designed with great care.
Which of the following methods would enhance a password access system?
A . The use of a two level system, a primary password plus questions correctly answered from set of queries, logged at system set up time.
B . The use of drop down menus, using screen coordinates rather than transmitting keystrokes over a communication link.
C . The logging and reporting of failed password attempts.
D . The password should be typed quickly.
E . The use of family members names, known only to the individual and not known by colleagues.
F . The use of a sequence of passwords, using upper and lower case with numbers, easy to remember but regularly changed for example; November 11, December12, January01.
Answer: A,B,C