Preview

Nt1330 Unit 1 Assignment

Good Essays
Open Document
Open Document
711 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1330 Unit 1 Assignment
QUESTIONS
1) Describe basic security issue based on authentication and authorization towards company that are given to your group.
2) Work corperatively in group to present e-commerce issue associated with electronic trade and commerce to ensure secured online business transaction in the actual market case study on.

QUESTION 1
EXAMPLE 1

EXAMPLE 2

Authentication and Authorization are two interrelated security concepts. Authentication and authorization are required for a Web page that should be limited to certain users:-

Authentication
Is a process of identifying a user and about verifying whether someone is who they claim to be. Typically, authentication is achieved by the user sharing credentials that somehow verify the user's identity. It usually involves a
…show more content…

On each subsequent use, the user must know and use the previously declared password. The weakness in this system for transactions that are significant is that passwords can often be stolen, accidentally revealed, or forgotten.

Authorization Is the process of determining if an authenticated user has access to the resources they requested. Is finding out if the person, once identified is permitted to manipulate specific resources. This is usually determined by finding out if that person is of a particular role that has access to the resources. Authorization is the function of specifying access rights to resources, which is related to information security and computer security in general and to access control in particular.
During operation, the system uses the access control rules to decide whether access requests consumers shall be approved or disapproved. Resources include individual files or items data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer programs and other devices on the


You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 1 Study Guide

    • 508 Words
    • 3 Pages

    Role-based access control (RBAC) is an access policy determined by the system, not the owner. RBAC is used in commercial applications and also in military systems, where multi-level security requirements may also exist. RBAC differs from DAC in that DAC allows users to control access to their resources, while in RBAC, access is controlled at the system level, outside of the user's control. Although RBAC is non-discretionary, it can be distinguished from MAC primarily in the way permissions are handled. MAC controls read and write permissions based on a user's clearance level and additional labels. RBAC controls collections of permissions that may include complex operations such as an e-commerce transaction, or may be as simple as read or write. A role in RBAC can be viewed as a set of…

    • 508 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 604 Words
    • 3 Pages

    6. What is the basic unit of information in an LDAP directory? What is the…

    • 604 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    All access control requirements are commensurate with the user’s duties at a particular incident. For DNS, access control is implemented in accordance with the following principles:…

    • 1211 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    The most secure of the traditional challenge/response authentication methods supported by IIS7 is Windows Authentication :Windows Authentication…

    • 1432 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    ____ authentication can be used in a Windows domain environment or on a Linux system to authenticate users and computers.…

    • 817 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 883 Words
    • 4 Pages

    Name Entity (NE) is an expression that refers to proper names such as persons, locations, and organizations. For example: Arafat Awajan is a full professor at Princess Sumaya University for Technology in Jordan, then Arafat Awajan, Princess Sumaya University for Technology, and Jordan would be identified as reference to person, an organization, and location, respectively. The task that attempts to locate, extract, and automatically classify named entities into predefined classes or types in open-domain and unstructured texts, such as newspaper articles, was called Name Entity Recognition (NER)[Shaalan 2014].…

    • 883 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    FINAL Project IS3230

    • 1645 Words
    • 6 Pages

    type of access control by which the operating system constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target. In practice, a subject is usually a process or thread; objects are constructs such as files, directories, TCP/UDP ports, shared memory segments, IO devices etc. Subjects and objects each have a set of security attributes. Whenever a subject attempts to access an object, an authorization rule enforced by the operating system kernel examines these security attributes and decides whether the access can take place. Any operation by any subject on any object will be tested against the set of authorization rules (aka policy) to determine if the operation is allowed. A database management system, in its access control mechanism, can also apply mandatory access control; in this case, the objects are tables, views, procedures, etc.…

    • 1645 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    07: Password and Ref

    • 4381 Words
    • 33 Pages

    Authentication is the process of ensuring that the individuals trying to access the system are who they claim to be.…

    • 4381 Words
    • 33 Pages
    Satisfactory Essays
  • Better Essays

    Access control methods are a process that determines what services or company resources an employee has access to. These methods will be used to determine what an employee can and cannot access, as well as ways to make sure that all employees are being granted the correct access levels. Authentication is a process of determining whether someone or something is who or what they say they are. Authentication can be a form of determining whether an employee is actually the person that they say they are. Employees can be authenticated by being able to answer personal questions that only they would know or by providing a username and password that only the employee knows.…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Good Essays

    First of all we need to define what authentication accurately is. Authentication is the ability to verify the identity of a user or a computer system on a computer network. (Barker, 2013) There are many forms or variations that authentication can manifest itself depending on the requirements as outlined in the Security Policy published by the business. Most commonly these would include one, two, or three factor configurations to verify the identity of the person requesting access to a resource. If everything associated with the authentication factors are valid and correct for the claimed identity, it is then assumed that the accessing person is who they claim to be. (Stewart, 2011) Some of the most common authentication factors would be something you know such as a password, something you have such as a smart card, and something you are such as a fingerprint.…

    • 630 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Fundamental of information security is based on three principle Confidentiality, Integrity and Availability. How a user will be able to access asset by following these three principle is called as Access control. “Access control is the process of allowing only authorized users, programs and other computer system (i.e. networks) to observe, modify or otherwise take possession of resources of a computer system. It is also a mechanism for limiting the use of some resources to authorized users.”…

    • 553 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    f. A software that you can use to check if your machine can be successfully upgraded to windows 7…

    • 657 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    10. For multiple choice questions. The question will be... Which of the following is a correct statement?…

    • 356 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Adobe Pass Case Study

    • 2760 Words
    • 12 Pages

    The following discusses the central entitlement transactions of authentication and authorization. Authentication is the process of confirming with a Pay TV provider that a given user is a known customer. Authorization is the process wherein a Pay TV provider confirms that an authenticated user has a valid subscription to a given resource.…

    • 2760 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    ADVANCED e-SECURITY

    • 451 Words
    • 2 Pages

    Q: What is the security that addresses the protection of individuals or groups authorized to access an organization?…

    • 451 Words
    • 2 Pages
    Satisfactory Essays