AllBestEssays.com - All Best Essays, Term Papers and Book Report
Search

Securing and Protecting Information

Essay by   •  March 7, 2013  •  Research Paper  •  1,089 Words (5 Pages)  •  1,816 Views

Essay Preview: Securing and Protecting Information

Report this essay
Page 1 of 5

Securing and Protecting Information

Introduction

The recent years have been marked by a lot of harmful applications which have progressively focused on internet activities. Because the quantity of internet activities keep growing strong, simplicity of net use and growing use base has perfected the criminal targets. For that reason, assaults on a lot of users may be accomplished in a single click. The techniques used in breaching internet security differ. But, these techniques have progressively turned out to be difficult and complicated as time passes. With the rise in the risk levels, the stronger rules are increasingly being issued to avoid more assaults. The majority of these steps have been targeted at boosting safety of the internet data. Of these techniques, the most notable method is security authentication as well as safety. This article thoroughly assesses the safety authentication procedure. The content also introduces security systems which help provide prevention against typical assaults.

Security authentication process

Authentication is the procedure which has progressively been used in confirmation of the organization or individual. For that reason, this is the procedure used in finding out whether something or somebody is what it's stated to be (LaRoche, 2008). Authentication therefore acts as part of a lot of internet applications. Prior to opening the email account, the verification procedure is included in identification of the foreign program. For that reason, the most typical verification application is performed through inclusion of security passwords. Before explanation of the verification procedure, it is very important describe a few of the critical phrases. In this concept, the word AAA is usually used to mean verification, accounting, as well as authorizations. Let's now distinguish between these phrases.

 Identification: This procedure is included to make sure that the user has the ability to recognize the user who has been explained to an automated system of information processing.

 Authorization: This procedure makes sure that the user has got the authority of issuing specific commands.

 Authentication: This procedure verifies that the user as it is proclaiming to be.

The following measures are included in the procedure of login. To make sure recognition by an application, the user is expected to identify itself. Accomplishment of identification is increased once the credentials are offered. In the authentication action, the claimed identity of the user is confirmed. Following verification procedure is done; authorization is included in meaning of exactly what the user is capable of doing in the application. During all this procedure, the accounting procedure monitors the user activities. Much like in other security procedures, this technique is a sequence (Charndra & Calderor, 2005). If there is a break in one of the factors; the entire chain is likely to break apart. This attracts focus on the importance of verification system. The accounting as well as authorization is only likely after correct identification and verification of the users (Hiltgen et al., 2006).

Effects of authentication for new information systems

An application security has got the ability of trading off between the higher security level and much more functionality. For that reason after including more security to verification, the result is observed through decrease in the approval rate of users when enhancing the usability. As a result, it's very difficult to discover the most dependable system of verification which the users can approve. Users are always

...

...

Download as:   txt (7 Kb)   pdf (106.6 Kb)   docx (11.6 Kb)  
Continue for 4 more pages »
Only available on AllBestEssays.com
Citation Generator

(2013, 03). Securing and Protecting Information. AllBestEssays.com. Retrieved 03, 2013, from https://www.allbestessays.com/essay/Securing-and-Protecting-Information/43538.html

"Securing and Protecting Information" AllBestEssays.com. 03 2013. 2013. 03 2013 <https://www.allbestessays.com/essay/Securing-and-Protecting-Information/43538.html>.

"Securing and Protecting Information." AllBestEssays.com. AllBestEssays.com, 03 2013. Web. 03 2013. <https://www.allbestessays.com/essay/Securing-and-Protecting-Information/43538.html>.

"Securing and Protecting Information." AllBestEssays.com. 03, 2013. Accessed 03, 2013. https://www.allbestessays.com/essay/Securing-and-Protecting-Information/43538.html.