Preview

Securing and Protecting Information

Powerful Essays
Open Document
Open Document
1465 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Securing and Protecting Information
Securing and Protecting Information
Andrew Truxton
CMGT 400
November 24, 2014
Romel Llarena
Securing and Protecting Information
The particular motivation behind this paper is to portray the confirmation process and to portray how this and other data security contemplations will influence the configuration and advancement process for new data frameworks. The confirmation methodology is a need for shielding frameworks against different structures of security dangers, for example, secret key splitting instruments, animal power or wordbook assaults, ill-use of framework access rights, mimic of confirmed clients, and to wrap things up answer assaults just to name a couple. Also, it is basic that confirmation strategies are compatible with the associations in which data is generally traded if assets are consistently imparted between elective associations.
Validation in definition is just evidence that something is true or what it is intended to be. Open systems and additionally private systems to incorporate the web use passwords as confirmation to approve logins. Information is obliged and is sifted through the watchword database in the event that a push to guarantee that the client is legitimate. Additionally, before anybody is permitted to get to an association 's intranet they should first be enlisted by somebody that has the suitable qualifications to approve them to get access. There are a lot of organizations and option in the need of extra validation routines and one technique deserving of specifying is the usage of advanced endorsements issued and checked by a Certificate Authority or as generally utilized the acronym CA.
This procedure incorporates the formation of a solid secret key and a record lockout strategy is made, logon hours are appointed, a ticket lapse strategy is made, and clock synchronization resilience to anticipate replay assaults is situated just to name some of what this procedure comprise of.
There are a few things that must be



References: D 'Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach.. Information Systems Research, 20(1), 79-98. Sanhu, R., & Samarati, P. (1996). Authentication, access control, and audit. ACM Computing Surveys (CSUR), 28(1), 241-243. Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. Consumer Electronics, IEEE Transactions on, 50(1), 231.

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    References: David Kim., and Michael G. Solomon. Fundamentals of Information Systems Security , 2012: Sudbury, MA 2012…

    • 634 Words
    • 3 Pages
    Better Essays
  • Good Essays

    BSA 375 Week 3 Individual

    • 793 Words
    • 3 Pages

    The level of security and its effectiveness in an application is a concern for all software development projects. Operations and Information Technology will hold key responsibility in implementation and maintenance of the software security measures. These measures will include but not be limited to firewalls, intrusion detection systems, credential verification, and standard backup operations (Valacich, 2012). This responsibility isn’t limited to just these measures or to this scope of responsibility. All hands that take part in development will have some responsibility in assuring appropriate security measures are developed, implemented, and maintained.…

    • 793 Words
    • 3 Pages
    Good Essays
  • Good Essays

    These procedures involve cyber security, ability planning, and recovery tolerances (Barr, 2010, p. 3). Cyber security cover a wide variety of subject matter, however the generally significant is that of determining the people who must have right of entry. Restricting the access to merely those individuals who actually require it will generally probable of lessening the danger of impending impairment to web-based systems. Different companies must not be concerned on an unexpected upsurge of users such as Facebook or EBay, accordingly their ability for storage can extend when the requirement occur. Although; in the exceptional deviations the requisite for a wider and further protected database is mandatory. Procedures and design must be ready ahead to deal with this problem if ever it occurs. Pertaining to recovery tolerance, all systems, and either it is for informational or monetary purposes must have a backup plan ready to curtail potential loss of…

    • 1099 Words
    • 5 Pages
    Good Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. By implementing a second level identity check to gain access to sensitive systems, applications, and data; you can protect from unauthorized access to the systems, applications, and data.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Using weak passwords, Unencrypted data storage, passing clear text credentials over the network, using weak authentication mechanisms, allowing prolonged session lifetime…

    • 1000 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Assignment

    • 533 Words
    • 3 Pages

    Organizations are under increased pressure to audit every action that a user performs within a database. This is due to increased focus on security, risk, accountability and avoidance of fraud and corruption. While security prevention measures (logins, firewalls, tokens etc.) are important to prevent unauthorized access to the data in the first place, as this survey shows, most breaches occur by users who are authorized but are either negligent or malicious.…

    • 533 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    AIS Review Sheet

    • 2832 Words
    • 12 Pages

    3) Authentication: Verifying the identity of the person or device attempting to access the system.…

    • 2832 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    07: Password and Ref

    • 4381 Words
    • 33 Pages

    Authentication is the process of ensuring that the individuals trying to access the system are who they claim to be.…

    • 4381 Words
    • 33 Pages
    Satisfactory Essays
  • Good Essays

    Csia 301 - Syllabus

    • 4678 Words
    • 19 Pages

    describe the necessity of secure architecture in information systems analyze the role of security models and architectures and their relationship to information security explain the…

    • 4678 Words
    • 19 Pages
    Good Essays
  • Powerful Essays

    The specific purpose of this paper is to describe the authentication process and to describe how this and other information security considerations will affect the design and development process for new information systems.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Various authentication methods are used and range from the simple to complex. The security level provided will vary depending on the utilized technique and deployment method. The most dominant method involves authentication with a password and username. However, this is also one of the most insecure methods. We can describe these devices and systems depending on the three factors:…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Access Control Policy

    • 833 Words
    • 3 Pages

    Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems…

    • 833 Words
    • 3 Pages
    Powerful Essays
  • Better Essays

    In order for ZXY Inc. to make sure that their entire organization is secure, some proposals have been put into place to protect the company. The company needs to make sure that the network, their employee’s, company devices, and communications are secure from the outside world. The proposals that have been put into place cover such areas as: access control methods, authentication, user’s accounts and passwords, cryptography, remote access, network attack mitigation, malware and device vulnerabilities, and web and e-mail attack mitigation. These proposals when combined together help form an entire security policy for ZXY Inc. to use in order to protect all company assets.…

    • 3217 Words
    • 13 Pages
    Better Essays