CMGT/400
Iwona Rusin
July 6th, 2015
Brandon Smith
This section is going to talk about Security and how it’s going to be involved with the overall process and what impacts it will have on the system, the cloud, and anything else the company decides to use for that matter because security will always be a big impact and should always be the first thought when trying something new or doing anything online. I will also go into detail about preventative measures, and some devices that will be helpful when setting up a secure system.
First we will go into detail about the Security authentication Process itself to shed some light on what it really is and how much it does to help protect you and your system from unwanted attention. Authentication is a process where you as the operator will have to enter in information in the form of an account name and password to access the system or even files on the system, this is the first step to making sure unwanted users are not on the system or gaining access to files they shouldn’t be in.
This can also be broken down and used to track anyone who is accessing any files, which hour’s files can be accessed, and if any editing can be done to the files once they are accessed as well. This is all done by the administrator and can be changed by only them, by doing this you are greatly increasing the security of the system and making sure only the required personal are accessing files with the most secure protection and if something were to happen then you can go back to whoever has access and who had accessed the files at the time before whatever had happened. Lastly on the authentication process itself, this can be broken down into two different methods of authentication such as user and machine and all this means is that some things are done by us as humans, and the computer itself will have its own form of authentication that it will need to do with other computers and