Next:
Slide 30
Up:
Network Security
Previous:
Slide 28
Adding users on a System
Give them the minimal amount of privileges they need.
Enforce ``good'' passwords. (
easier said than done!
).
Poor passwords are the most important vulnerability. Biometric Authentication.
Consider password aging
Be aware when/where they login from, or should be logging in from.
Make sure and remove their account when they no longer need the access.
Sridhar Iyer
2001-01-08