StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Answer some questions - Assignment Example

Cite this document
Summary
Authentication, access control and auditing work together to establish a defense in layers for a network by ensuring that only authorized users have access to data. This implies that authentication helps in verifying the identity of users through control mechanisms such as…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.7% of users find it useful
Answer some questions
Read Text Preview

Extract of sample "Answer some questions"

Information Technology Authentication, access control and auditing work together to establish a defense in layers for a networkby ensuring that only authorized users have access to data. This implies that authentication helps in verifying the identity of users through control mechanisms such as application of passwords and pin combinations (Ciampa 123). Similarly, the access control facilitates the defense in network layers by assigning users to various roles in order to grant permissions to access different functions.

In this way, the auditing ensures that a system conforms to the security requirements of an individual or an institution. As a result, authentication, access control and auditing work together to establish network defense through the verification procedures, assigning roles to users and installing control mechanisms that curb errors and frauds. A breach of the CIA triad for a campus police department at a mid-sized private university will allow access of confidential information to third parties.

This can lead to loss of data through modification, alteration and disclosure, leading to harmful risks to students and the institution’s database. As a result, hackers can obtain personal information of students and use them for illegal activities like cyber bullying, leaking of examination or tampering with the management information systems. Another breach is that criminals or hackers can access the police methods of tackling crime and use them to evade arrests. This is because new systems of operations are normally taught in the campus police departments.

The two-factor authentication I would use is the security token since it ensures that every police officer possesses a physical device that shall allow him or her to access the criminal database. However, the potential problems of this new authentication system are that it can be stolen or lost easily, the system provider can face hacking or the cryptography can be cracked. This implies that the loss of the token can permit an authorized person to access the database. It is also apparent that hacking of the token can affect their security purposes, especially if the provider has not installed tight measures.

OSI model portrays and standardizes the internal operations of a communication system. This occurs through the partitioning of the communication system into concealed details of the functionalities. The OSI model is essential for network security because it simplifies the communication between computers through internet connectivity in a secure manner (Ciampa 125). Another advantage is that the OSI model enables the sending of numerous bytes at a single time to other devices. It also standardizes interfaces during the communication process in the systems.

The various network investigation tools available online includes L0phcrack, Domain Dossier, John the Ripper and Dictionary attack. L0phcrack is a password recovery system that strengthens window passwords. Domain Dossier is essential for scrutinizing domains and IP addresses in the internet applications. The Dictionary attack is model that breaks password-secured computer through using dictionary words as passwords. Digital evidence is legal information transmitted in digital format and be act an evidence in court cases.

In this regard, investigators face problems using such materials because they can be fabricated by hackers or software experts. Another problem is that digital evidence requires encrypted passwords, which should not be lost or tampered with by third parties (Ciampa 205).Work CitedCiampa, Mark D. Security+ Guide to Network Security Fundamentals. Boston, MA: Course Technology, Cengage Learning, 2012. Print.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Answer some questions Assignment Example | Topics and Well Written Essays - 500 words”, n.d.)
Answer some questions Assignment Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1684755-answer-some-questions
(Answer Some Questions Assignment Example | Topics and Well Written Essays - 500 Words)
Answer Some Questions Assignment Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1684755-answer-some-questions.
“Answer Some Questions Assignment Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1684755-answer-some-questions.
  • Cited: 0 times

CHECK THESE SAMPLES OF Answer some questions

The Role of Fluency in Comprehension

Name: Institution: Course: Date: The Role of Fluency in Comprehension Good readers read effortlessly, quickly, and with automaticity.... When they read silently or aloud, they read with expression and tone, emphasizing right words, and inserting appropriate pauses.... hellip; If children struggle to decode words, then they do not have mental resources or attention left over to dedicate to enjoyment and comprehension....
4 Pages (1000 words) Essay

Technology Plan and Effective Online Communication Skills

Another essential element of E-mail etiquette is numbering questions and putting points in bullet form.... By numbering all the questions and putting the main points in bullets, the email is broken down to standard protocols, which makes it possible for the recipient to understand the whole message.... While a message is not organized in points and the questions not numbered, the recipient may only...
4 Pages (1000 words) Research Paper

Local Health Practices of African Americans

Interview with African American Family Within the local neighborhood, one had the opportunity to interview a traditional African American family, particularly the grandmother who was more than willing to Answer some questions about local health practices.... Thus, the aim is thereby made possible through locating an African American family and interviewing some members of the family to ascertain if the information about the culture in the textbook is correct....
3 Pages (750 words) Essay

Evaluating Popular vs. Scholarly Presentations of Global Climate Change

This paper will evaluate 2 popular and 2 scholarly presentations on global warming and Answer some questions. 1.... This paper will evaluate 2 popular and 2 scholarly presentations on global warming and Answer some questions.... The presentation style of scholarship podcast is good and in the format of interview (question and answer), so it can attract the attention of audience....
2 Pages (500 words) Essay

Sickle cell anemia

Some research questionnaires would be used, and patients and doctors would be asked to Answer some questions which will be provided to them by a research team.... The research questions are listed below:• Do SCA have medicines?... This disease mostly affects the African Americans where there are about 1500 people admitted due to this disease… Around 70,000 people, who are from sub African, even though there are some reports in India, some parts of central and South American areas, southern parts of Europe, and Caribbean regions mostly experience sickle cell anemia....
2 Pages (500 words) Research Paper

Green Computing Research Project Part 2

The company needs five part time workers who will be working for the company and contact code corp contact, Christian Jones for maintenance of the project and database maintenance.... Since Code Company is the creator and source of the website that is responsible for scanning the… In the scanning, the company will need the best scanners to be used by the company customers and they will contact DevAn Consultant Company by the help of their agent to The company will need a well functioning network that will enable the two IT analysts to maintain and implement the system by consulting Christian at the code company....
3 Pages (750 words) Case Study

Memo about ap stylebook

It is important for them to develop a platform for communication with the people so that they may tell them and Answer some questions or any other revisions made to the stylebook.... The AP stylebook changes frequently mainly to affix or clarify some entries.... There are some words that are treated as two words, yet they seem better when they are written as one.... With the increase in user generated journalism pieces, the stylebook is supposed to show how they can secure and authenticate photo captions and some video scripts....
1 Pages (250 words) Essay

Find your own topic

The directors also have to Answer some questions while competitors also sense a great deal of an opportunity to take over and even benefit from the crisis.... Employees of a company will also raise hard questions on the management of the business and even the handling of a crisis by the management.... some of these responses include the company giving no response to the situation in the hope that it dies down by itself.... some of these may be that customers will cancel any orders that they may have made....
2 Pages (500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us