Preview

Cmgt400 Week 3

Better Essays
Open Document
Open Document
1752 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cmgt400 Week 3
Running head: ASSIGNMENT: SECURING AND PROTECTING INFORMATION

Assignment: Securing and Protecting Information
David Sauerbrei
CMGT/400
11/24/12
Robert L. Quintin
Axia College of University of Phoenix Assignment: Securing and Protecting Information
Authentication
With the advances in technology, authentication has become part of our everyday lives, whether scanning your badge at work, signing for a credit card purchase, or logging into your Facebook/Twitter accounts. Authentication is the act of validating your identity while requesting access to software, purchases, or entry to a secured facility. There are four types of authentication; something you know, something you have, something you are, and something you can produce. When a service requests two or more types of authentication, it is called strong authentication, such as inserting an identification card and providing a password to access a computer workstation.
Something you know refers to the use of passwords, passphrases, and codes or PINs. When creating a password, the user must make the decision to create a string of alphanumeric and special characters with differing cases. The longer and more complicated a password the user creates drastically reduces the risk of cracking or brute force attacks. The same password must also be something easily remembered by the user to dissuade it from being written down and stored onsite or left at the workstation. A solution to this is creating a passphrase, a common phrase or date abbreviated and linked together with special characters to create a personal passphrase difficult to crack but easy to remember. An example of this would be a favorite television show with the day and time it airs. A common rule is to create a string at least eight character longs with at least one number and one special character, which this example adheres.
The something you have method requires the user to carry and use an access control item. A



References: Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012).   Principles of Computer Security: Comp TIA Security + and Beyond (third ed.). Boston, MA: McGraw-Hill Company. Whitman, M., & Mattord, H. (2010).   Management of Information Security (third ed.). Pittsburgh, PA: Cengage Learning.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    2.2 Password protection could be used to ensure security when storing and/or accessing information. Also ensuring that no-one who is…

    • 244 Words
    • 1 Page
    Satisfactory Essays
  • Best Essays

    Cmgt 430 Week 2

    • 1585 Words
    • 7 Pages

    INTRODUCTION..................................................................................................................... 3 SECURITY REQUIREMENTS............................................................................................... 3 Firewall Protection................................................................................................................ 4 Password Protection.............................................................................................................. 4 Password Renewal................................................................................................................. 4 POTENTIAL RISKS.................................................................................................................…

    • 1585 Words
    • 7 Pages
    Best Essays
  • Better Essays

    Access control methods are a process that determines what services or company resources an employee has access to. These methods will be used to determine what an employee can and cannot access, as well as ways to make sure that all employees are being granted the correct access levels. Authentication is a process of determining whether someone or something is who or what they say they are. Authentication can be a form of determining whether an employee is actually the person that they say they are. Employees can be authenticated by being able to answer personal questions that only they would know or by providing a username and password that only the employee knows.…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Satisfactory Essays

    3d password

    • 300 Words
    • 2 Pages

    Therefore the idea of 3D passwords, are more customizable and very interesting way of authentication. This is an additional textual password which the user can simply put. Once he goes through the first authentication, a 3D virtual room will open on the screen for e.g. a garage. Now in a day to day garage one will find all sorts of tools, equipments, etc. each of them having unique properties. The user will then interact with these properties accordingly. Each object in the 3D space, can be moved around in an (x,y,z) plane. That’s the moving attribute of each object. This property is common to all the objects in the space. That can be identified as an authentication. Only the true user understands and recognizes the object which he has to choose among many. This is the Recall and Recognition part of human memory coming into play. There can be levels of authentication a user can undergo which can be implemented so as to enhance security.…

    • 300 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Permission-before carrying out an observation you must have parents and the settings permission. Confidentiallity- do not to leave confidential material lying around they must be secured in a locked cabinet.…

    • 259 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cmgt 441 Week 2

    • 262 Words
    • 2 Pages

    Introduction The article on Facebook apps leaked users’ information, security. Lawmakers says that hundreds of thousands apps may have gotten access tokens to user personal information into the hands of unauthorized parties. Supposedly the company has corrected the issue. This article will be evaluated on its usefulness and validity or appropriateness. After carefully reviewing the article critics will be able to evaluate the paper accordingly.…

    • 262 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Harris, S Kak, A. (2012). Lecture notes on “computer and network security”. (Lecture Notes, Purdue University Retrieved from https://engineering.purdue.edu/kak/compsec/NewLectures/Lecture20.pdf…

    • 2890 Words
    • 12 Pages
    Powerful Essays
  • Better Essays

    References: Conklin, W. A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of computer security: CompTIA Security+™ and beyond (3rd ed.). New York, NY: McGraw Hill.…

    • 1099 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Thus began the opening chapter of one of the foundation books in the computer security field. This book, commissioned by the National Academy of sciences, was the product of twenty-one…

    • 2101 Words
    • 9 Pages
    Powerful Essays
  • Best Essays

    References: Whiteman, Mattord, M.E.W, H,J,M 2011, Principles of Information Security, Cengage learning, Kennesaw State University…

    • 3522 Words
    • 15 Pages
    Best Essays
  • Powerful Essays

    Jutta Joachim and Andrea Schneiker Security Dialogue 2012 43: 495 DOI: 10.1177/0967010612463488 The online version of this article can be found at: http://sdi.sagepub.com/content/43/6/495…

    • 10783 Words
    • 44 Pages
    Powerful Essays
  • Satisfactory Essays

    CMGT 410 week 5

    • 308 Words
    • 2 Pages

    Enables project manager to analyze the findings of the review and improve on certain aspects in the next project that need attention.…

    • 308 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    We must be secure in your life, to keep your things safe from anyone or any damage. The consequences of losing items vary from item to item according to its value and importance. For us to be able to function in today’s society requires security. And this security is needed in almost every aspect of life; no matter how large or small it may be.…

    • 508 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Computer "Law"

    • 1833 Words
    • 8 Pages

    References: Whitman, M. E., & Mattord, H. J. (2012). Principles of Information Security (4th ed.). Boston, MA: Course Technology (Cengage Learning). ISBN13: 978-1-1111-3821-9…

    • 1833 Words
    • 8 Pages
    Better Essays
  • Better Essays

    Authentication: Verifying the identity of an individual. Passwords, ID, Biometrics, Security Badge, Digital Certificates, Tokens; Always something you have, something that you are, something you know.…

    • 2012 Words
    • 11 Pages
    Better Essays