Preview

cgmt 400 week 3 individual securing and protecting information

Powerful Essays
Open Document
Open Document
1478 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
cgmt 400 week 3 individual securing and protecting information
Securing and Protecting Information
Michael Anthony Horton
University of Phoenix
August 18, 2014
Instructor: Dr. Stephen Jones

Securing and Protecting Information The specific purpose of this paper is to describe the authentication process and to describe how this and other information security considerations will affect the design and development process for new information systems. The authentication process is a necessity for safeguarding systems against various forms of security threats, such as password-cracking tools, brute-force or wordbook attacks, abuse of system access rights, impersonation of attested users, and last but not least reply attacks just to name a few. In addition, it is imperative that authentication policies are interchangeable with the organizations in which information is being exchanged if resources are being shared between alternative organizations. Authentication in definition is simply proof that something is real or what it is meant to be. Public networks as well as private networks to include the internet use passwords as authentication to authorize logins. Data is required and is filtered through the password database if an effort to ensure that the user is authentic. Also, before anyone is allowed to access an organization’s intranet they must first be registered by someone that has the appropriate credentials to authorize them to gain access. There are plenty of businesses and alternative in the need of additional authentication methods and one method worthy of mentioning is the utilization of digital certificates issued and verified by a Certificate Authority or as commonly used the acronym CA. This process includes the creation of a strong password and an account lockout policy is created, logon hours are assigned, a ticket expiration policy is created, and clock synchronization tolerance to prevent replay attacks is set just to name



References: CMGT/400-Intro to Information Assurance and Security D 'Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach. Information Systems Research, 20(1), 79-98 Myers, J. G. (1997). Simple authentication and security layer (SASL). Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. Consumer Electronics, IEEE Transactions on, 50(1), 231- Sandhu, R., & Samarati, P. (1996). Authentication, access control, and audit. ACM Computing Surveys (CSUR), 28(1), 241-243. Rocha Flores, Waldo, Egil Antonsen, and Mathias Ekstedt. "Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture", Computers & Security, 2014. .

You May Also Find These Documents Helpful

  • Satisfactory Essays

    07: Password and Ref

    • 4381 Words
    • 33 Pages

    Authentication is the process of ensuring that the individuals trying to access the system are who they claim to be.…

    • 4381 Words
    • 33 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    References: Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: Comp TIA Security + and Beyond (third ed.). Boston, MA: McGraw-Hill Company.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Information security is the protection of information against accidental or malicious disclosure, modification or destruction. Information is an important, valuable asset of IDI which must be managed with care. All information has a value to IDI. However, not all of this information has an equal value or requires the same level of protection. Access controls are put in place to protect information by controlling who has the rights to use different information resources and by guarding against unauthorised use. Formal procedures must control how access to information is granted and how such access is changed. This policy also mandates a standard for the creation of strong passwords, their protection and frequency of change.…

    • 1356 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Cited: Ballad, B. B. (2011). Access Control, Authentication, and Public Key Infrastructure. Burlington: Jones & Bartlett Learning.…

    • 630 Words
    • 3 Pages
    Good Essays
  • Good Essays

    With the use of computers and networks, there is also a large focus on security. Whenever there is sensitive data being stored and transferred through computer networks, there is the risk of unauthorized individuals gaining access to this information. To lower these chances, we have several different pieces of software and also require multiple passwords that are unique to each authorized individual and a requirement to change the passwords…

    • 791 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Insider Threats

    • 4039 Words
    • 17 Pages

    In recent years, countries around the world have been developing rules and regulations which are designed to support data confidentiality and security. Many organizations have spent decades on building stronger defenses against intrusion, including firewalls, anti-virus software, email security, identity access badges, security policies and procedures. These protections have made the business world more effective at blocking threats and attacks from the outside and made it increasingly difficult for hackers and viruses to penetrate into the system. However these protections provide only a first line of defense since it is designed to prevent unauthorized access.…

    • 4039 Words
    • 17 Pages
    Best Essays
  • Good Essays

    Hussein, Handbook of Information Security ( I, 38-64). Hoboken, New Jersey: John Wiley & Sons,…

    • 483 Words
    • 2 Pages
    Good Essays
  • Best Essays

    CB Hart has suffered major reputation problems because of disregarding the small security issues. Company has been affected by the event of data leakage. The information that leaked was not hugely confidential but that situation was damaging enough to cause a big decrease in the reputation of the CB Hart.…

    • 3482 Words
    • 14 Pages
    Best Essays
  • Good Essays

    Computer Security

    • 414 Words
    • 2 Pages

    Many commercial software packages are designed with computer security features that control who can access the computer. These types of access controls use a process called identification and authentication. Identification verifies that the user is a valid user, and authentication verifies that the user is who he or she claims to be. Three common methods of authentication are remembered information, possessed objects, and biometric devices.…

    • 414 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The Security of Cloud Computing System enabled by Trusted Computing Technology Zhidong Shen International School of Software, Wuhan University, Wuhan, China, 430079 zhidongshen@163.com Qiang Tong School of Software, Northeastern University, Shenyang, China, 110004 qiang.tong@163.com Abstract—Cloud computing provides people the way to share distributed resources and services that belong to different organizations or sites. Since cloud computing share distributed resources via the network in the open environment, thus it makes security problems important for us to develop the cloud computing application. In this paper, we pay attention to the security requirements in cloud computing environment.…

    • 3993 Words
    • 16 Pages
    Powerful Essays
  • Powerful Essays

    One of the fundamental reasons that an organization creates a computer network is to facilitate the collection and storage of data. Attached to the collection of that data, is the responsibility to protect the integrity of it, as well as limit the access to it, to minimize the possibility for misuse. Numerous pieces of data must be secured because they comprise the information needed to establish identity, open lines of credit, and legally…

    • 1833 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Reinert, Lawrence A, Luther, Stephen C (1997), User Authentication Techniques Using Public Key Certificates. Part 2: Authentication Information Including Biometrics, National Security Agency, Department of Defense, USA.…

    • 3876 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    a distributed system, various resources are distributed in the form of network services provided and managed by servers. Remote authentication is the most commonly used method to determine the identity of a remote client. In general, there are three authentication factors: Something the client knows: password. Something the client has: smart card. Something the client is: biometric characteristics (e.g., fingerprint, voiceprint, and iris scan). Most early authentication mechanisms are solely based on password. While such protocols are relatively easy to implement, passwords (and human generated passwords in particular) have many vulnerabilities. As an example, human generated and memorable passwords are usually short strings of characters and…

    • 6790 Words
    • 28 Pages
    Good Essays
  • Better Essays

    What is authentication

    • 1235 Words
    • 5 Pages

    Authentication is a process used to establish the identity of a particular user trying to access data or information on a web server. Authenticating users is a common part of most web applications. It is an important security measure used to protect confidential data i.e, bank details. Without a means of verifying a potential user, data access may be grantedto an unauthorised user which can lead to serious consequences if used for malicious purposes.Authentication can be achieved through using authentication credentials along with a user ID and a password and is done through an authentication server this is explained more here:…

    • 1235 Words
    • 5 Pages
    Better Essays
  • Best Essays

    References: [1] X. Suo, Y. Zhu, and G. S. Owen, “Graphical passwords: A survey,” in Proc. 21st Annual…

    • 3600 Words
    • 15 Pages
    Best Essays