CMGT400- Week3: Security Considerations

Apr 22nd, 2015
Studypool Tutor
University of Phoenix
Course: Business and Management
Price: $10 USD

Tutor description

Security authentication in an information system is critical. It involves the process of identifying a user, normally based on a specific username and password. Authentication ensures that the user is the user that they claim to be. This is very different from authorization, which involves enabling users to have access to a system given their status, and identity. Authentication of authorized personnel is a key component in establishing a secure information system for a business.

Word Count: 1736
Showing Page: 1/9
Security ConsiderationsRobert RobbinsCMTG/400April 19, 2014Dave FedorchakIntroduction Security authentication in an information system is critical. It involves the process of identifying a user, normally based on a specific username and password. Authentication ensures that the user is the user that they claim to be. This is very different from authorization, which involves enabling users to have access to a system given their status, and identity. Authentication of authorized personnel is a key component in establishing a secure information system for a business. This paper will go over this and other security considerations that will create that security, and what to avoid. Authentication Security Considerations There are five security main security concerns that can affect the design and development processes of information systems. The first is weak passwords. Most often people normally create passwords that are easily remembered. If a password is extremely easy to remember, the odds are that an unauthorized person could be able to guess what it is. Brute force attacks are a common practice against easily remembered passwords. There are tools available on the Internet to help with this. The term brute force means to make as many attempts as possible. A way of protecting against this is to set an account lock after a set number of failed attempts. An unfortunate occurrence is that many users set the same easy to remember password on man

Review from student

Studypool Student
" <3 it, thanks for saving me time. "
Ask your homework questions. Receive quality answers!

Type your question here (or upload an image)

1826 tutors are online

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors