Cmgt/400 Securing and Protecting Information

In: Computers and Technology

Submitted By Caseylee333
Words 2199
Pages 9
Computers, networks, and software are the heart and soul of the IT world today. Because of the availability of those systems, they are very vulnerable to malicious attacks and activity. It is of upmost importance that an organization takes security seriously and takes the proper measures to protect their systems. They can do this through a number of different ways, but one area of focus is through the authentication process and the related hardware and software to go along with it.
Identification and Authentication
Authentication is the process of the system or program recognizing the user and granting them access, which has been predetermined by access controls. It begins with two major parts; Identification and Authentication. Identification is the process in which the system recognizes the user and gives them access according to Abstract object that are controlled by the administrators of the files and systems. Privileges will be granted based on their user account having been verified. This process is usually a user ID. The system recognized the ID and knows the access right and privileges of that individual that have been verified.
The Authentication begins once the user account ID has been identified. This is the process in which the user credentials are actually verified, meaning the specific attributes of their specific user account and authenticated and verified to make sure the access rights are correct. This process uses a password or some sort of credential such as, a PIN, Certificate, or ticket. The system needs to authenticate the identity of the user by verifying their credentials. (Todorov, 2011).
Authentication can be completed by a system in many different ways. As explained earlier, a simple password or form of identifying the person specifically is used a front line authentication method. This is also known as a Single Sign-on Authentication…...

Similar Documents

Securing and Protecting Information

...Securing and Protecting Information CMGT/400 May 27, 2013 Securing and Protecting Information Introduction The last few years have been marked by numerous malicious applications that have increasingly targeted online activities. As the number of online activities continues to grow strong, ease of Internet use and increasing use base has perfected the criminal targets. Therefore, attacks on numerous users can be achieved at a single click. The methods utilized in breaching Internet security vary. However, these methods have increasingly become complicated and sophisticated over time. With the increase in threat levels, stronger legislations are being increasingly issued to prevent further attacks. Most of these measures have been aimed at increasing the security of Internet information. Among these methods, the most prominent approach is security authentication and protection. This paper comprehensively evaluates the security authentication process. The paper also introduces security systems that help provide resistance against common attacks. Security Authentication Process Authentication is the process that has increasingly been utilized in verification of the entity or person. Therefore, this is the process utilized in determining whether something or someone is what it is declared to be (LaRoche, 2008). Authentication hence acts as part of numerous online applications. Before accessing an email account, the authentication process is incorporated in......

Words: 1090 - Pages: 5

Securing and Protecting Information

...Securing and Protecting Information Securing and Protecting Information CMGT/400 May 27, 2013 Securing and Protecting Information Introduction The last few years have been marked by numerous malicious applications that have increasingly targeted online activities. As the number of online activities continues to grow strong, ease of Internet use and increasing use base has perfected the criminal targets. Therefore, attacks on numerous users can be achieved at a single click. The methods utilized in breaching Internet security vary. However, these methods have increasingly become complicated and sophisticated over time. With the increase in threat levels, stronger legislations are being increasingly issued to prevent further attacks. Most of these measures have been aimed at increasing the security of Internet information. Among these methods, the most prominent approach is security authentication and protection. This paper comprehensively evaluates the security authentication process. The paper also introduces security systems that help provide resistance against common attacks. Security Authentication Process Authentication is the process that has increasingly been utilized in verification of the entity or person. Therefore, this is the process utilized in determining whether something or someone is what it is declared to be (LaRoche, 2008). Authentication hence acts as part of numerous online applications. Before accessing an email account, the authentication......

Words: 1094 - Pages: 5

Disaster Securing and Protecting Information

...Disaster Securing and Protecting Information Sherry Stender CMGT 400 December 10, 2012 Dr. Derek Sedlack Disaster Securing and Protecting Information Authentication, verifying a user’s identity, is an important way to establish trust in business processes. Authentication is the process of verifying a user’s claim of identity and is most commonly implemented through a username and password combination when logging into a business’ system or application. While the password and username combination is the most common, there are various other methods of authentication such as: voice recognition, a token device, or swiping a smart card. Authentication is based on the principle that a proper form of identification is not produced by the user that the system will not correlate an authentication factor with a specific subject. Many factors can contribute to a system’s security, but the authentication is a key element to the success of a secure information system. Authentication is vital for maintaining the integrity, confidentiality, and availability of a business’ IT infrastructure. The application of access controls includes 4 processes: * Identification- obtaining the identity of the user that is seeking access to a physical or logical area * Authentication- confirming the user’s identity that is requesting access to a physical or logical area * Authorization- determining which specific actions can be performed by the authenticated user in a specific logical......

Words: 1433 - Pages: 6

Securing and Protecting Information

...Securing and Protecting Information Instructor: April 24, 2014 Security Authentication Process It is necessary to secure your authentication method to safeguard your system against varied forms of security threats, like password-cracking tools, brute-force or wordbook attacks, abuse of system access rights, impersonation of attested users, and reply attacks. Additionally, if you share resources on your network with alternative organizations, you need to make sure that your authentication policies are interchangeable with the organization in which you are exchanging your information with. Authentication is the method in which a person must prove that they are who they say they are. Public networks as well as private networks (including the Internet), use authentication to utilized or authorize logins and passwords. Data is required and ran through the password database to ensure that the user is authentic. Before anyone is allowed to access an organization’s intranet, they must first register or be registered by someone that has the appropriate credentials to perform these tasks. For this reason, net business and plenty of alternative transactions need additional authentication methods. “The utilization of digital certificates issued and verified by a Certificate Authority (CA) as a part of a public key infrastructure is taken into account probably to become the quality thanks to perform authentication on the web” (D'Arcy, Hovav, & Galletta, 2009). Process......

Words: 1469 - Pages: 6

Cmgt 400 - Intro to Information Assurance & Security

...CMGT 400 Full Course http://www.learnyourcourse.com/cmgt-400/86-cmgt-400-full-course.html CMGT 400 WEEK 1 CMGT 400 Week 1 Assignment (Individual) - Risky Situations CMGT 400 Week 1 Assignment (Team) - Kudler Fine Foods IT Security Report -Kudler System Review CMGT 400 Week 1 Discussion Question # 1- How can information be an asset in a company? Discuss three different examples of information that should be protected by a company and not exposed. Include several examples of what management could do to protect each example. CMGT 400 Week 1 Discussion Question # 2- What is the mindset required to properly protect information? What role does reasoned paranoia play in the minded and how can an individual keep the proper balance between protecting information and enabling business? CMGT 400 WEEK 2 CMGT 400 Week 2 Assignment (Individual) - Common Information Security Threats CMGT 400 Week 2 Assignment (Learning Team) - Kudler Fine Foods IT Security Report -Top Threats CMGT 400 Week 2 Discussion Question # 1- Which of the threats from social networking in the Horn (2010) article also apply to other businesses? Which do not? Why do you think so? CMGT 400 Week 2 Discussion Question # 2- Why do you think one of the methods in the Heimerl (2010) article would be the most effective way for an organization to save money? CMGT 400 WEEK 3 CMGT 400 Week 3 Assignment (Individual) - Disaster Securing and Protecting Information CMGT 400 Week 3 Assignment (Learning Team)......

Words: 627 - Pages: 3

Cmgt 400 (Intro to Information Assurance & Security)Entire Class

...CMGT 400 (Intro to Information Assurance & Security)Entire Class Purchase here http://chosecourses.com/cmgt-400-intro-to-information-assurance-amp-securityentire-class Product Description CMGT 400 Week 1 Week 1 Individual Assignment Risky Situation Complete the UniversityMaterial: Risky Situations table found on your student website. List three types of sensitive information involved with each situation. Identify three ways each information item could be misused or harmed.Answer the questions at the end of the table. CMGT 400 Week 1 Team Assignment Kudler Fine Foods IT Security Report - System Review Kudler Fine Foods is in the process of developing a customer loyalty program and related system to give rewards to their customers based on their purchases and other relevant information. Your team has been asked to direct the development team in what they must do to ensure the system is developed in a secure manner and that it properly protects company and customer information at all stages of development Each week, the team prepares different portions of the final paper and presentation, which recommends exactly what the development team should do at each step of the development process including any related policy, training, and ongoing IT audit elements. Review the material for Kudler Fine Foods in the Virtual Organizations. Familiarize yourself with the company and its systems, and identify the specific systems or areas......

Words: 1414 - Pages: 6

Securing and Protecting Information

...Securing and Protecting Information Jane Doe CGMT/400 March 9, 2015 John Doe Securing and Protecting Information As the most important asset within the organization it is necessary to provide measures that can effectively protect data from loss and unauthorized intrusions. Information security involves authenticating users with a high level of protocol and promoting accountability within the information infrastructure. This approach may involve use of the organization assets, identification, authentication, authorization and the use of third party security systems or devices to protect data from unauthorized access. Security Authentication Process The security authentication process is the first step in information security and assurance. This process involves “binding a specific ID to a specific computer connection” (University of Phoenix, 2011) in order to authenticate access to the information system. During this process the user provides a user ID and password to the computer system or remote server to verify his or her identity. Authentication is accomplished when the system or server matches the user ID to a specific password and grants the user remote access to system resources. Identification The identification process is an access control element designed to match a user to a specific process. The identification process is performed the first time a user ID is issued to a specific user. User IDs have unique values and......

Words: 1903 - Pages: 8

Securing and Protecting Information

...Securing and Protecting Information Connectivity and accessibility is a top priority, most electronics in our daily lives are connected to the internet, therefore it is extremely important to maintain devices connected to the internet secure from risks and threats. Remote access enables users outside a network access and provides privileges based on the security settings. Users are able to access resources through an internet service provider or ISP which is connecting remotely to the resources online. Secure connectivity is able to be done due to an authentication process, this process establishes a user’s identification to enable access and grant permissions. There are several ways to establish a network connection based on the software, hardware, and network type and security requirements. Security authentication Wireless devices are able to connect remotely involving two elements: a temporary network connection and a series of protocols that set the privileges and commands. The temporary network connection, occurred through a wired connection or wireless access, or any other method of connecting to a network. The primary issue is authenticating the identity of the user and establishing proper privileges for that user. This is accomplished using a combination of protocols and the operating system on the host machine. The three steps in the establishment of proper privileges are authentication, authorization, and accounting, also known as AAA. Authentication is......

Words: 1275 - Pages: 6

Cmgt 400 (Intro to Information Assurance & Security)Entire Class

...CMGT 400 (Intro to Information Assurance & Security)Entire Class Purchase here http://homeworkgoods.com/cmgt-400-intro-to-information-assurance-amp-securityentire-class Product Description CMGT 400 Week 1 Week 1 Individual Assignment Risky Situation Complete the UniversityMaterial: Risky Situations table found on your student website. List three types of sensitive information involved with each situation. Identify three ways each information item could be misused or harmed.Answer the questions at the end of the table. CMGT 400 Week 1 Team Assignment Kudler Fine Foods IT Security Report - System Review Kudler Fine Foods is in the process of developing a customer loyalty program and related system to give rewards to their customers based on their purchases and other relevant information. Your team has been asked to direct the development team in what they must do to ensure the system is developed in a secure manner and that it properly protects company and customer information at all stages of development Each week, the team prepares different portions of the final paper and presentation, which recommends exactly what the development team should do at each step of the development process including any related policy, training, and ongoing IT audit elements. Review the material for Kudler Fine Foods in the Virtual Organizations. Familiarize yourself with the company and its systems, and identify the specific systems or areas......

Words: 1414 - Pages: 6

Cmgt 400 (Intro to Information Assurance & Security)Entire Class

...CMGT 400 (Intro to Information Assurance & Security)Entire Class Purchase here http://homeworkonestop.com/cmgt-400-intro-to-information-assurance-amp-securityentire-class Product Description CMGT 400 Week 1 Week 1 Individual Assignment Risky Situation Complete the UniversityMaterial: Risky Situations table found on your student website. List three types of sensitive information involved with each situation. Identify three ways each information item could be misused or harmed.Answer the questions at the end of the table. CMGT 400 Week 1 Team Assignment Kudler Fine Foods IT Security Report - System Review Kudler Fine Foods is in the process of developing a customer loyalty program and related system to give rewards to their customers based on their purchases and other relevant information. Your team has been asked to direct the development team in what they must do to ensure the system is developed in a secure manner and that it properly protects company and customer information at all stages of development Each week, the team prepares different portions of the final paper and presentation, which recommends exactly what the development team should do at each step of the development process including any related policy, training, and ongoing IT audit elements. Review the material for Kudler Fine Foods in the Virtual Organizations. Familiarize yourself with the company and its systems, and identify the specific systems or......

Words: 7066 - Pages: 29

Cmgt 400 Intro to Information Assurance & Security

...CMGT 400 Intro To Information Assurance & Security Purchase Here: http://www.homeworkprinciples.com/downloads/cmgt-400-intro-to-information-assurance-security/ CMGT 400 Week 1 DQ 1 Post a 150-200-word response to the following discussion question by clicking on Reply. What is the mindset required to properly protect information? What role does reasoned paranoia play in the minded and how can an individual keep the proper balance between protecting information and enabling business? CMGT 400 Week 1 DQ 2 How can information be an asset in a company? Discuss three different examples of information that should be protected by a company and not exposed. Include several examples of what management could do to protect each example. CMGT 400 Week 1 Kudler Fine Foods IT Security Report & Presentation-Kudler System Review, CMGT 400 Week 1-Ind. Assignment Risky Situations CMGT 400 Week 2 CMGT 400 Week 2 DQ 1 Post a 150-200-word response to the following discussion question by clicking on Reply. Why do you think one of the methods in the Heimerl (2010) article would be the most effective way for an organization to save money? CMGT 400 Week 2 DQ 2 Which of the threats from social networking in the Horn (2010) article also apply to other businesses? Which do not? Why do you think so? CMGT 400 Week 2 Assignment-Kudler Fine Foods IT Security Report & Presentation-Top Threats CMGT 400 Week 2 Individual Assignment-Common Information Security Threats (1100+......

Words: 624 - Pages: 3

Cmgt 400 (Intro to Information Assurance & Security)Entire Class

...CMGT 400 (Intro to Information Assurance & Security)Entire Class Purchase here http://chosecourses.com/cmgt-400-intro-to-information-assurance-amp-securityentire-class Product Description CMGT 400 Week 1 Week 1 Individual Assignment Risky Situation Complete the UniversityMaterial: Risky Situations table found on your student website. List three types of sensitive information involved with each situation. Identify three ways each information item could be misused or harmed.Answer the questions at the end of the table. CMGT 400 Week 1 Team Assignment Kudler Fine Foods IT Security Report - System Review Kudler Fine Foods is in the process of developing a customer loyalty program and related system to give rewards to their customers based on their purchases and other relevant information. Your team has been asked to direct the development team in what they must do to ensure the system is developed in a secure manner and that it properly protects company and customer information at all stages of development Each week, the team prepares different portions of the final paper and presentation, which recommends exactly what the development team should do at each step of the development process including any related policy, training, and ongoing IT audit elements. Review the material for Kudler Fine Foods in the Virtual Organizations. Familiarize yourself with the company and its systems, and identify the specific systems or areas......

Words: 1414 - Pages: 6

Cmgt 400 (Intro to Information Assurance & Security)Entire Class

...CMGT 400 (Intro to Information Assurance & Security)Entire Class Purchase here http://homeworkonestop.com/cmgt-400-intro-to-information-assurance-amp-securityentire-class Product Description CMGT 400 Week 1 Week 1 Individual Assignment Risky Situation Complete the UniversityMaterial: Risky Situations table found on your student website. List three types of sensitive information involved with each situation. Identify three ways each information item could be misused or harmed.Answer the questions at the end of the table. CMGT 400 Week 1 Team Assignment Kudler Fine Foods IT Security Report - System Review Kudler Fine Foods is in the process of developing a customer loyalty program and related system to give rewards to their customers based on their purchases and other relevant information. Your team has been asked to direct the development team in what they must do to ensure the system is developed in a secure manner and that it properly protects company and customer information at all stages of development Each week, the team prepares different portions of the final paper and presentation, which recommends exactly what the development team should do at each step of the development process including any related policy, training, and ongoing IT audit elements. Review the material for Kudler Fine Foods in the Virtual Organizations. Familiarize yourself with the company and its systems, and identify the specific systems or......

Words: 1414 - Pages: 6

Securing and Protecting Information

...CMGT 400 Week 3 Securing and Protecting Information Security Authentication Process It is necessary to secure your authentication method to safeguard your system against varied forms of security threats, like brute-force or wordbook attacks, impersonation of users, and reply attacks. Additionally, if you share resources on your network with alternative organizations, you need to make sure that your authentication policies are interchangeable with the organization in which you are exchanging your information with. Authentication is the method in which a person must prove that they are who they say they are. Public and private networks, utilize authorized logins and passwords. Data is ran through the password database to ensure that the user is someone that has the credentials to access the network. In order to allow access a company’s intranet, they must register or be registered with the appropriate credentials to access this network. For this reason, net business and plenty of alternative transactions need additional authentication methods. “The utilization of digital certificates issued and verified by a Certificate Authority (CA) as a part of a public key infrastructure is taken into account probably to become the quality thanks to perform authentication on the web” (D'Arcy, Hovav, & Galletta, 2009). Process includes: Create a strong password policy Establish an account lock out policy Assign logon hours Create a ticket expiration policy Establish network......

Words: 1442 - Pages: 6

Cmgt400 Week 3 Securing and Protecting Information

...Securing and Protecting Information CMGT400 Securing and Protecting Information The internet is a worldwide phenomenon, reaching across the globe and connecting virtually every person together. The internet is essentially comprised of one thing, information. It is information entered into code that produces the websites, emails, and advertisements people see displayed every day. As a result, there are numerous products available which provide connectivity and internet service. Businesses, companies, and banks use the internet to conduct business with customers and other associates. The internet allows companies to potentially recruit customers from around the world, who they normally would not have any interaction with otherwise. With this added advantage of being able to reach across the world, also comes the add threat of becoming a target of malicious hackers. The hackers attention becomes drawn to these companies and their systems and clients' information becomes at risk. The cloud is an offsite storage technology which was originally only available to businesses, but is now easily available to the public. Companies and users are able to store their files on servers instead of local machines, often paying a fee to do so. It is often a useful way to reduce overhead and maintenance costs while paying a company to secure your data and back it up in a virtual environment. Companies that provide this service utilize advanced security software and......

Words: 1513 - Pages: 7