Sign In
Not register? Register Now!
You are here: HomeEssayTechnology
Pages:
3 pages/≈825 words
Sources:
3 Sources
Level:
APA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 18.23
Topic:

Authentication and Information Technology Security (Essay Sample)

Instructions:

The VArious threats to information security.

source..
Content:

Authentication and Information Security
Name:
Instructor:
Institution:
Date:
The advent of the technological age was heralded as a watershed moment for mankind. The innovation and enterprise of the previous generations had culminated in the technological and information age that is currently being enjoyed. People can now run their businesses and perform financial transactions in the comfort of their homes. Things are more convenient than they were before. The information age has however come with its negative impacts, such as the threat to information.Three articles by Darril Gibson, Mellisa Killian and Chample et.al. offer a discussion on authentication and information security.
Authentication and information security are like different parts of the same body. Authentication safeguards information and is, therefore, a factor of information security. Authentication can be defined as the process in which the system and also an individual proves what he or she claims to be (Killian, 2015).To access a system, for example, one would be required to give the required details.Authentication then comes in when the system requires the person to prove he or she is the legit owner of those details.
There are three examples of authentication. First is the authentication that requires personal proof. It is the arguably the safest and, therefore, the toughest to crack for any identity thieves. It involves the system requiring proof of one’s identity through physical characteristics, such as the iris or fingerprint (Killian, 2015).The biometric confirmation of such features would then enable the system authentication. The second kind of authentication is by proof of what one has. By proof of what one has, the system interprets the individual as a registered member. For example, an individual can be authenticated by the system if he or she has a tag or access card (Gibson, 2011).
The final example of authentication is through the use of what one knows. It is a straightforward process that calls for the knowledge of passwords or security access codes. It doesn’t involve any biometric authentication or any other physical proof of the same. Here, the password or security code is the one and only line of defense. It is also the easiest to be manipulated since one can know the password but isn’t authorized to access certain information (Gibson, 2011).
Knowledge of authentication and information security is very important for anyone enjoying the current technological advancements. Interconnectivity through the internet has ensured that data is easily accessible from any part of the world (Chample, 2002).Nowadays, online transactions are commonplace through wireless money transfer. Online payment platforms, such as PayPal and Payoneer, require more and more privacy on the side of its users. The password should be an extremely private matter for anyone accessing his or her information through the online platform.
Hackers and other cybercriminals are always on their toes, trying to come up with ways in which they can gain access to people’s personal information. It is as a result of this that most systems opt for the two-step authentication process (Chample et.al. 2002).It entails the combination of either of the two earlier mentioned examples of authentication. For example, to access information, the system can request for the password and then it sends a one-time code to one's phone.The pho...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Network Security: Opening to the World
    Description: Utility Communication Solutions, Smart Grid Security, and Smart Grid Cyber Security are some of the tutorials available from RAD University...
    2 pages/≈550 words| 3 Sources | APA | Technology | Essay |
  • Explore the Critical Success Factors (CSFS) In the Deployment of ERP Systems
    Description: The basic function of ERP is based on the ability to use the resources within the data warehouse by the data miners and system explorers...
    1 page/≈275 words| No Sources | APA | Technology | Essay |
  • The Impact of Mobile Computing
    Description: The invention of Smartphones and tablets that have incorporated desktop operating systems has placed the global information at the fingertips of the user...
    4 pages/≈1100 words| 2 Sources | APA | Technology | Essay |
Need a Custom Essay Written?
First time 15% Discount!