Disaster Securing and Protecting Information
Security authentication is a hot topic in today's business world. However, many people may have differing ideas when it comes to what security authentication actually is. This paper will address those perceptions in a straightforward and easy to understand manner. Security authentication is, as defined by our text, “the process of establishing a user's identity to enable the granting of permissions.” This is a rather simple definition of a process that has many different areas and permutations that it encapsulates and includes within its scope. In order to better illustrate the concepts and requirements of a viable information security plan, they will be applied to Kudler Fine Foods. The final analysis of the weaknesses and strengths in the current setup of Kudler Fine Foods information security setup will provide a good direction for the new policy to be implemented. After an analysis of Kudler Fine Foods potential problem security areas, a better and more detailed layout of the needs of Kudler and the steps that need to be taken in order to answer those needs. The steps outlined by the traditional model of the software development lifecycle will be the guiding outline to aid in the construction of an appropriate plan of attack to deal with the individual security needs a business like Kudler Fine Foods has for its projected security system. Through defining and enumerating the assets possessed by Kudler Fine Foods, a clearer picture of what may come to be under attack by outside forces will be seen to develop logically and in a comprehensive fashion. The following information disseminated by this paper will go to illustrate the potential flaws in a burgeoning information security system, as well as the steps to protect the same system, and what the future will most probably hold for the advancement of electronic security measures and countermeasures. Threats...
References: 1. (2010). Principles of Computer Security: CompTIA Security+ and Beyond (2nd ed.). : McGraw-Hill.
2. Financial Times. (2011). Retrieved from http://220.127.116.11/search/srpcache?ei=UTF-8&p=industrial+espionage&type=723823&fr=chr-greentree_ie&u=http://cc.bingj.com/cache.aspx?q=industrial+espionage&d=4754198581283049&mkt=en-US&setlang=en-US&w=c6513897,8485017a&icp=1&.intl=us&sig=AdqFKEgeQYX8L6I.CV_rgw--#axzz1pgutTQxson March 20, 2012
Please join StudyMode to read the full document