O'Reilly logo

Writing Information Security Policies by Scott Barman

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Login Security

All the precautions were placed on the network, the architecture supports the business plan and security policy, and the facilities are physically secure. Finally, here we are at the front gate. The front gate is where the user or the service identifies themselves and presents some type of credentials to request entry. The failure to have good login policies in place is like building the best nuclear submarine but using a screen door for a hatch.

Login Requirements and Procedures

The first thing that should be expected of any login sequence is to identify who is requesting access. Regardless of the protocols used, you need to know who is trying to access network services—or in some cases, who they want the network services ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required