trusted systems?
Added: 05/15/01 1. A trusted system allows system auditing to be turned on. System auditing enables the ability to trace every system call issued by each user on the system. Non-trusted systems run with system auditing disabled. 2. Trusted systems have improved password management. Below is a list of password management features: a. Specification of a grace period and expiration period for passwords. b. The ability to specify system-wide password aging. c. The ability to specify an absolute account life. d. The ability to disable accounts after repeated login failures. e. Passwords lengths of up to forty (40) characters. f. The ability to access a random password generator. 3. Trusted systems have additional login restrictions, while non-trusted systems do not. Below are the features of trusted system login restrictions: a. In addition to account disabling, the account may also be locked. b. Setting accounts to be accessed only at certain times of the day. c. The ability to specify acc