Solved

What's the best proactice for user id's

Posted on 2007-11-27
3
248 Views
Last Modified: 2010-04-02
Liked to know if short user id's not not a best practice.  What would be a best practice for user IDs
0
Comment
Question by:mutec1
3 Comments
 
LVL 6

Assisted Solution

by:ashutosh_kumar
ashutosh_kumar earned 100 total points
ID: 20358365
there is no such rule but usually its advised to keep it greater than 5 or 6 characters, so that its not easy to guess them.
0
 
LVL 1

Accepted Solution

by:
AMountaineer earned 300 total points
ID: 20358375
Opinions will vary on this. However as a rule, the longer the user ID, the more difficult for someone else to guess it.

Personally I would reccommend no less than 8 characters and have at least one letter, one number and one 'special character' &*( etc. within those eight.

This combined with a password of similar length will help to protect your data
0
 
LVL 4

Assisted Solution

by:deltronic
deltronic earned 100 total points
ID: 20358517
I would suggest using something unique to each employee like there employee number or a standard like first 3 letters of there first name and 3 first of there last name. Ex: John Doe would be johdoe. The real emphasis should be on password complexity. The password should be complex to prevent unauthorized people from logging in the system and causing security issues.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

INTRODUCTION The purpose of this document is to demonstrate the Installation and configuration of the Data Protection Manager product. Note that this demonstration was prepared on the basis of Windows OS is 2008 R2 and DPM 2010. DATA PROTECTI…
The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
In this video, we discuss why the need for additional vertical screen space has become more important in recent years, namely, due to the transition in the marketplace of 4x3 computer screens to 16x9 and 16x10 screens (so-called widescreen format). …

912 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now