Answered You can hire a professional tutor to get the answer.

QUESTION

Need an research paper on the security technology evaluation. Needs to be 5 pages. Please no plagiarism.

Need an research paper on the security technology evaluation. Needs to be 5 pages. Please no plagiarism. To create the technology program, one needs to create a new table within the existing database. This table should strictly store information regarding any login attempts from a given organization’s computer. An SQL script could be used to create the table especially in MySQL Server for the organization. In most case, SQL is used as a query that is performed using a declarative SELECT statement. The SELECT element is used to retrieve data from the table created to store login information of users. SELLECT statements that are standardized do not have any persistent effects the organizations database. SQL is mainly designed to query the data contained within a rational database. It is usually a set-based and declarative query language.

A programming process would be applied in this case. After the program is created successfully, the system will start checking any unauthorized logins attempts. When attempts limit is not reached, the system will check if the data entered is correct. Once the data is verified, all information about any previous login attempts are deleted (WebCheatSheet, 2014). Most information systems give room for only three unsuccessful attempts. For this program, the next authorization user would have only three login attempts, after which the system restricts access for 30 minutes (WebCheatSheet, 2014). The same user can retry for the other three attempts before access is denied for another 30 minutes when the system records three unsuccessful attempts.

Verifying account lockout configuration is very critical. For the verification process, the security properties for the system are reviewed. This is best done within the local security settings. Windows server operating systems could be used by default, including Windows 2000 Server, Windows 2003 Server, and Windows NT 4.0 among others.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question