Preview

Securing And Protecting Information

Better Essays
Open Document
Open Document
1446 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Securing And Protecting Information
Securing and Protecting Information
CMGT/400
Iwona Rusin
July 6th, 2015
Brandon Smith

This section is going to talk about Security and how it’s going to be involved with the overall process and what impacts it will have on the system, the cloud, and anything else the company decides to use for that matter because security will always be a big impact and should always be the first thought when trying something new or doing anything online. I will also go into detail about preventative measures, and some devices that will be helpful when setting up a secure system.
First we will go into detail about the Security authentication Process itself to shed some light on what it really is and how much it does to help protect you and your system from unwanted attention. Authentication is a process where you as the operator will have to enter in information in the form of an account name and password to access the system or even files on the system, this is the first step to making sure unwanted users are not on the system or gaining access to files they shouldn’t be in.
This can also be broken down and used to track anyone who is accessing any files, which hour’s files can be accessed, and if any editing can be done to the files once they are accessed as well. This is all done by the administrator and can be changed by only them, by doing this you are greatly increasing the security of the system and making sure only the required personal are accessing files with the most secure protection and if something were to happen then you can go back to whoever has access and who had accessed the files at the time before whatever had happened. Lastly on the authentication process itself, this can be broken down into two different methods of authentication such as user and machine and all this means is that some things are done by us as humans, and the computer itself will have its own form of authentication that it will need to do with other computers and

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    The process of confirming a user's identity, usually by requiring the user to supply some sort of token, such as a password or a certificate, is called authentication : Authentication…

    • 1432 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    Is a process of identifying a user and about verifying whether someone is who they claim to be. Typically, authentication is achieved by the user sharing credentials that somehow verify the user's identity. It usually involves a…

    • 711 Words
    • 3 Pages
    Good Essays
  • Good Essays

    An extra layer of authentication for the security of resources by two-step verification. The combination of any two or more veri-fication methods (password, biometrics, trusted device).…

    • 553 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    AIS Review Sheet

    • 2832 Words
    • 12 Pages

    3) Authentication: Verifying the identity of the person or device attempting to access the system.…

    • 2832 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    07: Password and Ref

    • 4381 Words
    • 33 Pages

    Authentication is the process of ensuring that the individuals trying to access the system are who they claim to be.…

    • 4381 Words
    • 33 Pages
    Satisfactory Essays
  • Powerful Essays

    Authentication in definition is simply proof that something is real or what it is meant to be. Public networks as well as private networks to include the internet use passwords as authentication to authorize logins. Data is required and is filtered through the password database if an effort to ensure that the user is authentic. Also, before anyone is allowed to access an organization’s intranet they must first be registered by someone that has the appropriate credentials to authorize them to gain access. There are plenty of businesses and alternative in the need of additional authentication methods and one method worthy of mentioning is the utilization of digital certificates issued and verified by a Certificate Authority or as commonly used the acronym CA.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    lab 5

    • 718 Words
    • 3 Pages

    What is Authorization and how is this concept aligned with Identification and Authentication? Authorization is a set of rights defined for a subject and an object; this concept is aligned with Identification and Authentication because these are the 3 steps to the access control process…

    • 718 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Various authentication methods are used and range from the simple to complex. The security level provided will vary depending on the utilized technique and deployment method. The most dominant method involves authentication with a password and username. However, this is also one of the most insecure methods. We can describe these devices and systems depending on the three factors:…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    As The Organization

    • 338 Words
    • 2 Pages

    Having the computers and other network devices managed by authentication through a server will keep unauthorized devices from accessing the network, and ensure the overall integrity of the network as a whole.…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    With the advances in technology, authentication has become part of our everyday lives, whether scanning your badge at work, signing for a credit card purchase, or logging into your Facebook/Twitter accounts. Authentication is the act of validating your identity while requesting access to software, purchases, or entry to a secured facility. There are four types of authentication; something you know, something you have, something you are, and something you can produce. When a service requests two or more types of authentication, it is called strong authentication, such as inserting an identification card and providing a password to access a computer workstation.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Final Test

    • 3035 Words
    • 13 Pages

    __________ is a Microsoft-proprietary protocol that authenticates users and computers based on an authentication challenge and response.…

    • 3035 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    |Authentication is a process in which the user’s credentials are used to verify|Authorization is a process in which the |…

    • 1819 Words
    • 8 Pages
    Good Essays