Cmgt 400 – Securing and Protecting Information
Securing and Protecting Information
Securing and Protecting Information
CMGT/400
May 27, 2013
Securing and Protecting Information
Introduction
The last few years have been marked by numerous malicious applications that have increasingly targeted online activities. As the number of online activities continues to grow strong, ease of Internet use and increasing use base has perfected the criminal targets. Therefore, attacks on numerous users can be achieved at a single click. The methods utilized in breaching Internet security vary. However, these methods have increasingly become complicated and sophisticated over time. With the increase in threat levels, stronger legislations are being increasingly issued to prevent further attacks. Most of these measures have been aimed at increasing the security of Internet information. Among these methods, the most prominent approach is security authentication and protection. This paper comprehensively evaluates the security authentication process. The paper also introduces security systems that help provide resistance against common attacks.
Security Authentication Process
Authentication is the process that has increasingly been utilized in verification of the entity or person. Therefore, this is the process utilized in determining whether something or someone is what it is declared to be (LaRoche, 2008). Authentication hence acts as part of numerous online applications. Before accessing an email account, the authentication process is incorporated in identification of the foreign program. Therefore, the most common authentication application is done through incorporation of passwords. Before description of the authentication process, it is important to explain some of the important terms. In this concept, the term AAA is commonly employed to mean authentication, accounting, and authorizations. Let us now differentiate between these terms.
* Authentication: This process confirms that the user is who they are claiming to be.
* Authorization: This process ensures that the user has the authority of issuing certain commands.
* Identification: This process is incorporated to ensure that the user is able to recognize the user that has been described to an automated system of data processing.
The following steps are incorporated in the process of login. To ensure recognition by an application, the user is supposed to identify itself. Achievement of identification is enhanced when the credentials are presented. In the authentication step, the claimed identity of the user is verified. After authentication process is complete, authorization is incorporated in definition