Preview

Cmgt400 Week 3

Better Essays
Open Document
Open Document
1752 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cmgt400 Week 3
Running head: ASSIGNMENT: SECURING AND PROTECTING INFORMATION

Assignment: Securing and Protecting Information
David Sauerbrei
CMGT/400
11/24/12
Robert L. Quintin
Axia College of University of Phoenix Assignment: Securing and Protecting Information
Authentication
With the advances in technology, authentication has become part of our everyday lives, whether scanning your badge at work, signing for a credit card purchase, or logging into your Facebook/Twitter accounts. Authentication is the act of validating your identity while requesting access to software, purchases, or entry to a secured facility. There are four types of authentication; something you know, something you have, something you are, and something you can produce. When a service requests two or more types of authentication, it is called strong authentication, such as inserting an identification card and providing a password to access a computer workstation.
Something you know refers to the use of passwords, passphrases, and codes or PINs. When creating a password, the user must make the decision to create a string of alphanumeric and special characters with differing cases. The longer and more complicated a password the user creates drastically reduces the risk of cracking or brute force attacks. The same password must also be something easily remembered by the user to dissuade it from being written down and stored onsite or left at the workstation. A solution to this is creating a passphrase, a common phrase or date abbreviated and linked together with special characters to create a personal passphrase difficult to crack but easy to remember. An example of this would be a favorite television show with the day and time it airs. A common rule is to create a string at least eight character longs with at least one number and one special character, which this example adheres.
The something you have method requires the user to carry and use an access control item. A



References: Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012).   Principles of Computer Security: Comp TIA Security + and Beyond (third ed.). Boston, MA: McGraw-Hill Company. Whitman, M., & Mattord, H. (2010).   Management of Information Security (third ed.). Pittsburgh, PA: Cengage Learning.

You May Also Find These Documents Helpful

  • Good Essays

    CMGT/430 Week 4

    • 622 Words
    • 3 Pages

    Lafleur Trading Company, established in 1975, is a worldwide supplier of the finest foods and wines. With buyers dealing strictly with reputable producers and exporters, Lafleur Trading Company guarantees the highest quality products. Some concerns have surfaced about the direction the organization should take in regards to some key areas.…

    • 622 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Cmgt 430 Week 2

    • 1585 Words
    • 7 Pages

    University of Phoenix (2005). Huffman Trucking Service Request SR-ht-001. Materials section. Retrieved February 08, 2011, from https://ecampus.phoenix.edu/secure/aapd/cist/…

    • 1585 Words
    • 7 Pages
    Best Essays
  • Satisfactory Essays

    CMGT 410 week 5

    • 308 Words
    • 2 Pages

    Enables project manager to analyze the findings of the review and improve on certain aspects in the next project that need attention.…

    • 308 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    Is the process of determining if an authenticated user has access to the resources they requested. Is finding out if the person, once identified is permitted to manipulate specific resources. This is usually determined by finding out if that person is of a particular role that has access to the resources. Authorization is the function of specifying access rights to resources, which is related to information security and computer security in general and to access control in particular.…

    • 711 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Storing secrets in clear text in files, registry, or configuration, Passing sensitive data in clear text over networks, Storing secrets when you do not need to…

    • 1000 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Passwords, ID, Biometrics, Security Badge, Digital Certificates, Tokens; Always something you have, something that you are, something you know.…

    • 2012 Words
    • 11 Pages
    Better Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2010). Management of Information Security (3rd ed.). Boston: Course Technology-Cengage.…

    • 939 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Access control methods are a process that determines what services or company resources an employee has access to. These methods will be used to determine what an employee can and cannot access, as well as ways to make sure that all employees are being granted the correct access levels. Authentication is a process of determining whether someone or something is who or what they say they are. Authentication can be a form of determining whether an employee is actually the person that they say they are. Employees can be authenticated by being able to answer personal questions that only they would know or by providing a username and password that only the employee knows.…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Powerful Essays

    Data origin authentication and peer authentication is checked using a keyed Message Authentication Code (MAC). Secure hash functions are used as components of MAC’s and digital signatures.…

    • 2890 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Volonino, L. and Robinson, S., Principles of Information Security: Protecting Computers from Hackers and Lawyers, (Readcon, New Jersey: 2005).…

    • 4348 Words
    • 18 Pages
    Powerful Essays
  • Powerful Essays

    Password Strength

    • 5555 Words
    • 23 Pages

    A password is a secret word or string of characters that is used for user authentication to prove identity, or for access approval to gain access to a resource (example: an access code is a type of password). The password should be kept secret from those not allowed access. The use of passwords is known to be ancient. Sentries would challenge those wishing to enter an area or approaching it to supply a password or watchword, and would only allow a person or group to pass if they knew the password. In modern times, user names and passwords are commonly used by people during a log in process that controls access to protected computer operating systems, mobile phones, cable TV decoders, automated teller machines (ATMs), etc. A typical computer user has passwords for many purposes: logging in to accounts, retrieving e-mail, accessing applications, databases, networks, web sites, and even reading the morning newspaper online.…

    • 5555 Words
    • 23 Pages
    Powerful Essays
  • Satisfactory Essays

    Symmetric Encryption

    • 322 Words
    • 2 Pages

    Symmetric Encryption is the oldest and best known encryption device/technique. The method contains a secret key which can be a series of random letters, a name, number, or even a word which is applied to the text portion of a message in order to change the content in a particular way.…

    • 322 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Sw Security

    • 3001 Words
    • 13 Pages

    Building Security In Editor: Gary McGraw, gem@cigital.com Software Security S oftware security is the idea of engineering software so that it continues to function correctly under malicious attack. Most technologists acknowledge this undertaking’s importance, but they need some help in understanding how to tackle it. This new department GARY MCG RAW Cigital 80 aims to provide that help by exploring software security best practices. The software security field is a relatively new one. The first books and academic classes on the topic appeared in 2001, demonstrating how recently developers, architects, and computer scientists have started systematically studying how to build secure software.…

    • 3001 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    computer

    • 873 Words
    • 3 Pages

    In the modern society, information can benefits both groups and individuals in many different areas. Whereas, at the same time, information also can be used to bring out a threat or even an act of war such as if a cyber attack which take down our financial systems or government systems. Computer security arouses the ethics and risk analysis, and is concerned with topics such as computer crime, the prevention, detection, remediation of attacks, identity and anonymity in cyberspace. In this paper, I want discuss the main problems of computer security and its serious threats.…

    • 873 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    3d password

    • 300 Words
    • 2 Pages

    Therefore the idea of 3D passwords, are more customizable and very interesting way of authentication. This is an additional textual password which the user can simply put. Once he goes through the first authentication, a 3D virtual room will open on the screen for e.g. a garage. Now in a day to day garage one will find all sorts of tools, equipments, etc. each of them having unique properties. The user will then interact with these properties accordingly. Each object in the 3D space, can be moved around in an (x,y,z) plane. That’s the moving attribute of each object. This property is common to all the objects in the space. That can be identified as an authentication. Only the true user understands and recognizes the object which he has to choose among many. This is the Recall and Recognition part of human memory coming into play. There can be levels of authentication a user can undergo which can be implemented so as to enhance security.…

    • 300 Words
    • 2 Pages
    Satisfactory Essays