Example Paper of Securing and Protecting Information

Topics: Computer security, Information security, Authentication Pages: 4 (1092 words) Published: August 16, 2013
Securing and Protecting Information
Securing and Protecting Information
May 27, 2013
Securing and Protecting Information
The last few years have been marked by numerous malicious applications that have increasingly targeted online activities. As the number of online activities continues to grow strong, ease of Internet use and increasing use base has perfected the criminal targets. Therefore, attacks on numerous users can be achieved at a single click. The methods utilized in breaching Internet security vary. However, these methods have increasingly become complicated and sophisticated over time. With the increase in threat levels, stronger legislations are being increasingly issued to prevent further attacks. Most of these measures have been aimed at increasing the security of Internet information. Among these methods, the most prominent approach is security authentication and protection. This paper comprehensively evaluates the security authentication process. The paper also introduces security systems that help provide resistance against common attacks. Security Authentication Process

Authentication is the process that has increasingly been utilized in verification of the entity or person. Therefore, this is the process utilized in determining whether something or someone is what it is declared to be (LaRoche, 2008). Authentication hence acts as part of numerous online applications. Before accessing an email account, the authentication process is incorporated in identification of the foreign program. Therefore, the most common authentication application is done through incorporation of passwords. Before description of the authentication process, it is important to explain some of the important terms. In this concept, the term AAA is commonly employed to mean authentication, accounting, and authorizations. Let us now differentiate between these terms. * Authentication: This process confirms that the user is who they are...

References: Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (3rd ed.).
Laudon, K. C., & Laudon, J. P. (2012). Management Information Systems. Managing the Digital Firm (12th ed.).
LaRoche, G. (2008). Fingering Transactional Strong Authentication. Security: Solutions for Enterprise Security Leaders, 45 (3): 110-112.
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Cmgt400 Securing and Protecting Information Essay
  • Securing And Protecting Information Essay
  • Week3 Securing And Protecting Information Essay
  • Essay on Securing and Protecting Information
  • Securing and Protecting Information Essay
  • Computer System Information System Paper
  • Example Paper
  • Example Paper

Become a StudyMode Member

Sign Up - It's Free