Securing And Protecting Information Essay

1292 words - 6 pages

Securing and Protecting Information

Connectivity and accessibility is a top priority, most electronics in our daily lives are connected to the internet, therefore it is extremely important to maintain devices connected to the internet secure from risks and threats. Remote access enables users outside a network access and provides privileges based on the security settings. Users are able to access resources through an internet service provider or ISP which is connecting remotely to the resources online. Secure connectivity is able to be done due to an authentication process, this process establishes a user’s identification to enable access and grant permissions. There are several ways to ...view middle of the document...

Accounting is the collection of billing and other detail records. Network access is often a billable function, and a log of how much time, bandwidth, file transfer space, or other resources were used needs to be maintained.
Authentication
Authentication is the process of binding a specific ID to a specific computer connection. Two items need to be presented to cause this binding to occur: the user ID, and some “secret” to prove that the user is the valid possessor of the credentials. Historically, three categories of secrets are used to authenticate the identity of a user: what users know, what users have, and what users are. It is the job of authentication mechanisms to ensure that only valid users are admitted.
Potential attackers are constantly searching for ways to get past the system’s authentication mechanism. Consequently, security professionals are constantly devising new methods, building on these three basic approaches, to provide authentication mechanisms for computer systems and networks. There are several other authentications processes and mechanisms to try to deter unauthorized users from getting access.

Kerberos

Kerberos is a network authentication protocol designed for a client/server environment. Kerberos securely passes a symmetric key over an insecure network using the Needham-Schroeder symmetric key protocol.
Kerberos is built around the idea of a trusted third party, termed a key distribution center KDC, which consists of two logically separate parts: an authentication server AS and a ticket-granting server TGS. Kerberos communicates via “tickets” that serve to prove the identity of users.
Certificates

Certificates are a method of establishing authenticity of specific objects such as an individual’s public key or downloaded software. A digital certificate is a digital file that is sent as an attachment to a message and is used to verify that the message did indeed come from the entity it claims to have come from. To verify the authenticity of an item, the public key of the signer is needed, and the digital certificate contains this information. A special form of authentication is the digital signature, which is an encrypted hash of an item that enables the recipient, using the public key, to verify that the original contents are not changed. The digital certificate can also contain a key that can be used to encrypt future communication.
Tokens

A token is a hardware device that can be used in a challenge/response authentication process. Several variations on this type of device exist, but they all work on the same basic principles. The device has an LCD screen and may not have a numeric keypad; devices without a keypad will display a password (often just a sequence of numbers) that changes at a constant interval, of about every 60 seconds. When an individual attempts to log into a system, he enters his own user ID number and then the number that is showing on the LCD screen. These two numbers are entered...

Other Papers Like Securing and Protecting Information

Principles of Information Security Chapter 1

4922 words - 20 pages security consisted of securing the physical location of the system by the use of badges, keys and facial recognition. With the creation of ARPANET and the increasing popularity of networked systems, it was no longer adequate to merely physically secure a system. In order to insure total security, the information itself, as well as the hardware used to transmit and store that information, needed to be addressed. Information security developed from this

Criminal Justice Essay

774 words - 4 pages , which is why it is very important steps be taken to protect personal information. If the personal information falls into the wrong hands, it may take several years to get fixed or may not get fixed at all. This is the age of technology, and it will continue to develop over the years. Homeland Security faces many daily challenges when it comes to protecting the nation and government from terroristic threats and crime. The Director of National

HIPAA Security: Implementing Technical Safeguards

2233 words - 9 pages €¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦. 10 ABSTRACT The Security Role plays a vital role in protecting and securing electronic protected health information (ePHI). All covered entities and business associates that deal with ePHI are mandated to ensure that they remain in compliance with the Security Rule. Failure to do so can result in severe penalties and be detrimental for those covered entities and

Critical Infrastructure Protection

1373 words - 6 pages progressively mechanized and more interlinked. Tending to these vulnerabilities requires more excellent adaptability, a huge evolutionary approach that compasses both open and private areas, securing both local and worldwide investment. Each branch and organization of elected, state and neighborhood governments are answerable for securing their own particular infrastructure; every section and office may as well have measures guaranteeing that

The Importance of Measuring Enterprise Impact

561 words - 3 pages Preventing Security Breaches: Collaborative Summary Towyna Robertson BIS/221 March 22, 2015 Stefan Bund Preventing security breaches is not as easy as people would think due to the fact that it is so much easier to share information. There are many potential threats that occur with computers and technology as a whole.  In order to prevent certain breaches in security you must first recognize and understand the different types of threats

Unit 6 Assignment 6.3

602 words - 3 pages DIM, encrypting data including emails using the proper keys or creating a relational database with access controls would be efficient. To go even further a company could add the method of securing the communications channels using protocols such as Secure Sockets Layer (SSL), Hypertext Transfer Protocol Secure (HTTPS), and could also potentially secure the path with a virtual private network (VPN). Protecting file systems are critical to

Keith Ransom

1022 words - 5 pages promotions and wage increases d. All of the above 5. Which of the following elements of a comprehensive financial plan involves analyzing future needs, such as saving for retirement or college funding for dependents (a) building wealth a. Building wealth b. Securing basic needs c. Establishing a firm foundation d. Protecting wealth and dependents Directions Respond to the following short-answer questions in 50-to

You Decide Week 5

764 words - 4 pages YouDecide week 5 There are many approaches to securing your organization and the network that runs your business. First of all, you want to maintain security in your building, its perimeter needs to be secured. Gating and lock systems are the primary methods for establishing a secure building. Buildings have multiple entries so basically IT professionals have to take the viewpoint of an attacker when arranging a site for physical

Securing Sql Server

1297 words - 6 pages Best practices for Disaster Recovery. Research Assignment 9 Robert Montini (18738519) Mr. Troianos Research Assignment 9 Robert Montini (18738519) Mr. Troianos Best practices for securing SQL Server. Best Practices for Disaster Recovery. Bad things happen, but to a corporation, entity or country, a bad thing happening to its server is worse than bad. It’s a Disaster. The loss of crucial information, records and vital statistics

Consumer Rights

571 words - 3 pages sufficient food, clothing, shelter, health care, education and sanitation. Consumers are fortunate to have rights; however, they come with responsibilities. For example, it is a consumer's responsibility to use products for their proposed purpose and to properly store and dispose of goods. Consumers should be concerned with securing, protecting, and asserting their rights in the marketplace while trading and transacting business to attain fair value

Financial Planning Worsheet Week 1

978 words - 4 pages involves analyzing future needs, such as saving for retirement or college funding for dependents? A a. Building wealth b. Securing basic needs c. Establishing a firm foundation d. Protecting wealth and dependents Directions Respond to the following short-answer questions in 50-to 100-words: 6. People have different styles when it comes to handling their money. List the two things that affect your personal beliefs and

Related Essays

Securing And Protecting Information Essay

1469 words - 6 pages CMGT 400 Week 3 Securing and Protecting Information Security Authentication Process It is necessary to secure your authentication method to safeguard your system against varied forms of security threats, like brute-force or wordbook attacks, impersonation of users, and reply attacks. Additionally, if you share resources on your network with alternative organizations, you need to make sure that your authentication policies are interchangeable

When Faced With Growth Essay

964 words - 4 pages Understanding The Concept of Protecting Personal Information (PPI) IFSM 201 6381 Concepts and Applications of Information Technology (2158) University of Maryland University College Understanding The Concept of Protecting Personal Information (PPI). Personally Identifiable Information or PII is information that can be used to distinctively identify, contact, or locate an individual. PPI

Preventing Security Breaches Essay

542 words - 3 pages operating system from 1998 is a recipe for disaster. Secure Your Network During late 2014, the State Department revealed that hackers had breached its unclassified email system. While the government claims that no sensitive information was lost, we have to wonder: why wasn’t this “unclassified” network encrypted with the same strength as its other networks? Securing networks by password protecting them and encrypting them is another easy way to

Assignment 2 Critical Infrastructure Protection

1707 words - 7 pages aviation security, and enhancing national preparedness levels for state and local law enforcement.       DHS responsibilities include the prevention of terrorism and enhancement of security to protect the country from terrorist threats.  Securing our boarders is a responsibility DHS maintains by covering the technology, personnel, and physical barriers that assist in protecting our boarder from breach. DHS maintains strict control of legal migration