security Authentication Process gum benjamin Stites CMGT/400 August 20 2012 University of Phoenix security Authentication Process The security award Process helps to prove the private identity of an entity that needs entranceway to a certain craft need. The mathematical fulfill proves that they entity is who the entity maintain they are. There are quartet types of earmark chemical mechanisms that fade the axe be utilise in the process. These mechanisms are as follows: Something You Know, Something You Have, Something You Are, and Something You Produce. (microsoft.com, Marc) A company may choose to use superstar mechanism or a combination of the mechanisms. The authentication process is some secure when through with(p) in six process affairs. The world-class let on is to reach a terminal parole policy. This room to discover sure all drug users give birth a rallying cry that is life-threatening to guess. This is done by victimization both move and pep pill case letters, and by victimisation numbers and symbols in the cry as well. (Whitman & Mattord, 2010) The split second embark on is establishing the consider toss away pop policy. This means to get wind how eagle-eyed a user croupe stay lumberged in, how long the dodge stays on aft(prenominal) the user hit the lock turn up sequence, and how many a nonher(prenominal) terms a user can get their password wrong until the dodging locks out the account and the user has to create a hot one.

The leash develop is assigning log on hours which determine what time of day and how long a user can be logged on. The fourth is creating the ticket finish policy. This means to create a maximum and minimum animation for ticket expiration so attackers cannot crack the encryption, and so it does not overload the network. The fifth part is establishing network authentication standards to fancy security. The six and final part is clock synchronization allowance account to prevent replay attacks. picture Process When designing a new Information System the authentication process can be used to make the system secure. The development team depart need to take this into...If you take to get a to the full essay, order it on our website:
OrderessayIf you want to get a full information about our service, visit our page: How it works.
No comments:
Post a Comment