Securing and Protecting Information

Submitted by: Submitted by

Views: 382

Words: 1489

Pages: 6

Category: Science and Technology

Date Submitted: 11/12/2013 09:49 AM

Report This Essay

Securing and Protecting Information

CMGT/400

Securing and Protecting Information

Introduction

Securing and protecting information has become increasingly far more difficult and complex then what is has been in the past. As the amount of internet users and new devices that use the internet continue to become more common, new methods and users trying to steal information will continue to advance as well. Hackers continue to develop new ways to steal private information, and develop these tools with increased simplicity. Hackers use different methods in breaching Internet security. These methods have increasingly become more complicated and difficult to detect and prevent over time. With the increase of security threats, new ideas and methods continue to be developed to prevent further attacks. Among these methods is security authentication and protection. This paper explains and evaluates the security authentication process, and discusses security systems that help provide protection against security threats.

Security Authentication Process

There are four processes in the security authentication process. These steps are Identification, Authentication, Authorization, and Accountability. It is vital to incorporate these four steps in any network if that network is to be secure. A network that has been correctly configured will protect your network from many of the common threats that networks face, such as password hacking, brute force attacks, and employees abusing their system rights.

Identification is the first of the four steps of the security process. Any user that expects to gain access to a system is referred to as a supplicant, and the tool that every user uses to gain entry to the system is referred to as an Identifier. This identifier can have many different methods for identifying the supplicant. The identifier should be able to locate the user’s credentials from a database the unique information that determines the supplicant’s identity. The...