I’m working on a operating systems exercise and need guidance to help me learn.
1. In the past, some systems operators have had difficulty revoking system access in a timely manner for temporary contract employees who are no longer active on the contracted project. Sometimes, these contractors are engaged to work on the project only a few days a month, during which they require full access.
a. What are the challenges posed by this group of employees?
b. As systems administrator, how would you manage access for them?
2 .Explain the concept of password salting using terminology that would be appropriate for a high school student, and without resorting to computer jargon.
3. Describe the advantages and disadvantages of password generator software. Would you recommend the use of such software for your own system? Explain why or why not.
4. Research the practice of key logging in current literature. Describe what it is and explain why some people defend the practice, while others do not. Finally, give your own opinion and defend it. Cite your sources.


0 comments