cgmt 400 week 3 individual securing and protecting information

Powerful Essays
Securing and Protecting Information
Michael Anthony Horton
University of Phoenix
August 18, 2014
Instructor: Dr. Stephen Jones

Securing and Protecting Information The specific purpose of this paper is to describe the authentication process and to describe how this and other information security considerations will affect the design and development process for new information systems. The authentication process is a necessity for safeguarding systems against various forms of security threats, such as password-cracking tools, brute-force or wordbook attacks, abuse of system access rights, impersonation of attested users, and last but not least reply attacks just to name a few. In addition, it is imperative that authentication policies are interchangeable with the organizations in which information is being exchanged if resources are being shared between alternative organizations. Authentication in definition is simply proof that something is real or what it is meant to be. Public networks as well as private networks to include the internet use passwords as authentication to authorize logins. Data is required and is filtered through the password database if an effort to ensure that the user is authentic. Also, before anyone is allowed to access an organization’s intranet they must first be registered by someone that has the appropriate credentials to authorize them to gain access. There are plenty of businesses and alternative in the need of additional authentication methods and one method worthy of mentioning is the utilization of digital certificates issued and verified by a Certificate Authority or as commonly used the acronym CA. This process includes the creation of a strong password and an account lockout policy is created, logon hours are assigned, a ticket expiration policy is created, and clock synchronization tolerance to prevent replay attacks is set just to name



References: CMGT/400-Intro to Information Assurance and Security D 'Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach. Information Systems Research, 20(1), 79-98 Myers, J. G. (1997). Simple authentication and security layer (SASL). Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. Consumer Electronics, IEEE Transactions on, 50(1), 231- Sandhu, R., & Samarati, P. (1996). Authentication, access control, and audit. ACM Computing Surveys (CSUR), 28(1), 241-243. Rocha Flores, Waldo, Egil Antonsen, and Mathias Ekstedt. "Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture", Computers & Security, 2014. .

You May Also Find These Documents Helpful

  • Better Essays

    Securing and Protecting Information Securing and Protecting Information CMGT/400 May 27, 2013 Securing and Protecting Information Introduction The last few years have been marked by numerous malicious applications that have increasingly targeted online activities. As the number of online activities continues to grow strong, ease of Internet use and increasing use base has perfected the criminal targets. Therefore, attacks on numerous users can be achieved at a single click. The methods…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Securing and Protecting Information Andrew Truxton CMGT 400 November 24, 2014 Romel Llarena Securing and Protecting Information The particular motivation behind this paper is to portray the confirmation process and to portray how this and other data security contemplations will influence the configuration and advancement process for new data frameworks. The confirmation methodology is a need for shielding frameworks against different structures of security dangers, for example, secret key splitting…

    • 1465 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Securing and Protecting Information CMGT/400 Iwona Rusin July 6th, 2015 Brandon Smith This section is going to talk about Security and how it’s going to be involved with the overall process and what impacts it will have on the system, the cloud, and anything else the company decides to use for that matter because security will always be a big impact and should always be the first thought when trying something new or doing anything online. I will also go into detail about preventative…

    • 1446 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Authentication Process xxxxxxx CMGT400 October 20, 2014 Instructor Name Security Authentication Process Introduction Securing and protecting information has become increasingly far more difficult and complex then what is has been in the past. As the amount of internet users and new devices that use the internet continue to become more common, new methods and users trying to steal information will continue to advance as well. Just this year we have seen large companies, corporations, and banking institutions…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Week 3 Individual

    • 1307 Words
    • 6 Pages

    Week 3 Individual Assignment Shelley Ashburn ENG/135 April 2, 2013 Treva Hereford Week 3 Individual Assignment Chapter 4 1. We request that you use the order form supplied in the back of our catalog. To help process your order please use the order form supplied in the back of our catalog. 2. We insist that you always bring your credit card to the store. So that we can faster serve your needs, always bring your credit card to the store. 6. To avoid the loss of your credit rating, please…

    • 1307 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Securing America and Protecting Civil Liberties Shanon Joy Cooper Ashford University Pol201: American National Government Final Paper Eliza Gordner July 2, 2012 In all aspects, the financial crisis of 2008 – 2009 has and is affecting millions of Americans. One key factor to the financial crisis in the American economy has been greed by not only the government, but businesses and individuals. Our federal government from the President, Congress, the Secretary of the Treasury…

    • 1932 Words
    • 8 Pages
    Better Essays
  • Good Essays

    "Assets are defined as broad resources, having their own distinctive economic value that might be owned and facilitated to produce income for the business. Assets are traditionally shown on the right-hand side of a company balance sheet, and are largely made up of two very distinct divisions, each having their own merits and utilities to the business. The two types of assets are current assets and non-current assets."(Tondom,2010)A current asset is a type of asset that can be sold or can generate…

    • 697 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Week 3 individual

    • 816 Words
    • 6 Pages

    Interpreting Financial Results Roxanne McCarthy FIN/571 June 9, 2014 Susanne Elliott Interpreting Financial Results Entrepreneur and business proprietors employ the financial ratios for their means to compute the administrations levels along with their accomplishments. Financial ratios comprise the assets, the result of the output, and the liquidity. The liquidity ratios maintain the company directors through determining in addition to satisfying the companies short-term monetary requirements. The…

    • 816 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Week Five paper graded "A" Debt Versus Equity Financing University of Phoenix ACC/400…

    • 485 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Common Information Security Threats involving Ethical and Legal Sally Lowe CMGT 400 January 19, 2015 Kell, David Common Information Security Threats involving Ethical and Legal Technologic advances occur at a rapid pace, with new devices coming out at frequent intervals. These new devices are appealing to college students who want to do everything as quickly and easily as possible. Because of the numerous smartphones, tablets, and laptops used by students and employees, college campuses face…

    • 1432 Words
    • 5 Pages
    Better Essays