.

Friday, 16 November 2012

Importance of Security Authorization for Electronics Devices

Companies which use modified cycle chains to lash computers to workstations may require only a single password to gain portal to the company network, and individuals may not be restricted as to which machines they prolong access.

gage breaches can go well beyond the stealth of an whole laptop computer at an airport containing a company's strategical business plans for the next five years. Such brazen theft is only one type of security problem lining organizations today. In addition, organizations must guard against corporate espionage, curious employees, employees end on committing criminal acts (including embezzling), and the simple theft of equipment for resale.

In such(prenominal)(prenominal) an environment, security authentication is not organizational paranoia; it is a instrument critical to the long-term success of the organization.

tribute authentication seeks to hold that the person using a particular piece of equipment, or accessing a particular piece of data, has the authority to do so. Security authentication is critical both to prevent external individuals from gaining access to inborn information as well as preventing internal individuals from gaining unauthorized access to information. Security authentication can be accomplished with: Tokens (something the person has); Knowledge (somethin


Mulholland, Sarah and Michael Garry. "Protecting Payments." Supermarket News (Dec 16, 2002): 41.

All biometric systems use a same two-step process: registration followed by authentication (Shimbun n.p.). During enrollment the physical characteristic (e.g., iris scan) is first captured, sampled, and measured. A luck of singular features is then extracted from the raw data using digital signal or image processing and feature declension techniques. The feature extraction reduces the amount of data storage and simplifies the duplicate process by reducing the characteristic to its essential and unique properties. The information that makes a person's iris unique is much littler than the raw data (Mulholland and Garry 41).

Salkever, Alex. "Why Biometrics is No legerdemain Bullet." Business Week Online (Jul 23, 2003): n.p.
Ordercustompaper.com is a professional essay writing service at which you can buy essays on any topics and disciplines! All custom essays are written by professional writers!

Knowledge-based systems use something the individual knows to establish identity. Examples of such knowledge include: snare, password, mother's maiden name, or birthplace. Knowledge systems atomic number 18 easy to use and relatively inexpensive to implement. In addition, since users typic exclusivelyy control the knowledge required to access the facility or equipment, there is a high level of user compliance. However, in order to be secure, knowledge systems rely on the willingness and ability of users to keep the knowledge confidential. Passwords and PINs can be stolen using audition and error. Many users are careless enough to write PIN codes on ATM separate or place post-its with passwords inner(a) their laptops. In some cases, knowledge-based authentication codes can be stolen through with(predicate) simple observation (Speir 1).

The primary drawback to using smart cards is that they introduce the token concept to the biometric approach to security with all of the disadvantages that go with tokens. Chief among these disadvantages is that authorized users will not have the smart card with them when they try to access the system. A correspondent problem is that unauthorized users
Ordercustompaper.com is a professional essay writing service at which you can buy essays on any topics and disciplines! All custom essays are written by professional writers!

No comments:

Post a Comment