Mis Exam 1

Submitted by: Submitted by

Views: 74

Words: 2162

Pages: 9

Category: Business and Industry

Date Submitted: 09/05/2014 06:20 PM

Report This Essay

1.

* Three authentication methods are passwords, token and biometric authentication. Authentication refers to the ability to know a person who they say they are; therefore, these forms of methods help verify that. Using a password is often used which is only known by the authorized users. A token is a physical device, similar to an ID that that is made to prove the identity of a user. Biometric authentication method is a method that uses systems to read and interpret people’s trait such as fingerprints, voices and their eyes.

* Firewalls prevent unauthorized users from accessing private networks. A firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic. In addition, many authentication controls have been added for Web pages as part of firewalls. Intrusion detection systems are full time monitoring tools that are set on the most important parts of the the corporate networks in which detect and deter intruders continually. At some points the system can be shut down at a sensitive part of a network if it receives unauthorized traffic. Antivirus software prevents, detects, and removes malware which include but are not limited to viruses computer worms, trojan horses and adware. In promoting security engagement, antivirus software must be continually updated in order to work efficiently.

* The role of encryption and digital certificates in a public key infrastructure is both provide protection of electronic transactions by authenticating a user’s identity. Encryption is the process of transferring plain text into data that cannot be read by any other user by the person it was meant to be sent to. The data is encrypted by using numerical codes and the message must be decrypted by the receiver. Digital certificates are data files used to establish the identity of users and electronic assets for protection of online transactions. They use a certificate authority to validate users...