What are the most important tools and technologies for safeguarding information resources?
Name and describe three authentication methods.
Authentication refers to the ability to know that a person is who he or she claims to be. Passwords known only to the authorized users. Token is a physical device that is designed to provide the identity of a single use. Smart card is a device that contains a chip formatted with access permission and other data.Biometrics is based on the measurement of a physical or behavioral trait that makes each individual unique.
Describe the roles of firewalls, intrusion detection systems, and antivirus software in promoting security.
A firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic. Firewalls prevent unauthorized users from accessing internal networks. They protect internal systems by monitoring packets for the wrong source or destination, or by offering a proxy server with no access to the internal documents and systems, or by restricting the types of messages that get through, for example, e-mail. Intrusion detection systems monitor the most vulnerable points or “hot spots” in a network to detect and deter unauthorized intruders. These systems often also monitor events as they happen to look for security attacks in progress. Sometimes they can be programmed to shut down a particularly sensitive part of a network if it receives unauthorized traffic.
Antivirus software is designed to check computer systems and drives for the presence of computer viruses and worms and often eliminates the malicious software, whereas antispyware software combats intrusive and harmful spyware programs. Often the software can eliminate the virus from the infected area. To be effective, antivirus software must be continually updated.
Describe the role of encryption and digital certificates in a public key infrastructure.
Digital certificates combined with public