In: English and Literature

Submitted By nmg123456
Words 795
Pages 4
When it came to writing the report it was definitely a long and tedious process. The way I attacked it was that I chose a topic, which was assisting in the redesign of a community association web site. Once that was determined I made sure to give myself plenty of time to get the report done. I took it one day at a time and made sure that everything I wrote was thorough and to the point. I broke down the information I gathered in to different sections such as what were the needs, requirements, what was a plausible idea and what options were just not obtainable. I completed one section at a time, and then I went through an found supporting references for specific items in my report. I organized the information in a way that flowed and made the report easy to read, I wanted to make sure that it went in order and the audience was aware of what was happening and that they were well informed of the information I was putting forth. I did my audience analysis after I completed my proposal. There was no real reason why I did it this way it just made sense to me to put my thoughts on paper and then decide what kind of audience I was addressing.

What I have learned from developing these reports is that it actually takes a lot longer then I thought it would take. I thought I would be able to sit down one day and put everything together in that one sitting. Was I wrong and I’m glad that I realized that early on, because if I had put this off to the last minute I would be suffering. You really have to do research and take notes and get to the basics, in my case of trying to develop a web site. I had to look up the aspects of what it takes for a company for put together a site. I looked in to average prices of what it cost to pay a company to do a web site, time lines for construction, and what were the best options for picking design and layout options.

The way I…...

Similar Documents

Network Access Control: User and Device Authentication

...Manufacturing Enterprise Security Network Access Control: User and Device Authentication August 2005 Intel IT is piloting new security methods to provide network access control by authenticating devices as well as users. Since networking has evolved to support both wired and wireless access, securing corporate networks from attack has become ever more essential. Therefore, to effectively enforce network access control policies in a proactive manner, we are developing a method to authenticate users and devices before they connect to the network. Network Access Control at Intel • Over 90,000 employees worldwide • 80 percent of knowledge workers are mobile and unwired • Over 50,000 remote access users Background As a global corporation, Intel IT supports more than 90,000 employees and contractors all over the world, and 80 percent of our knowledge workers are mobile and unwired. Network access depends more and more upon wireless LANs and WANs, as well as virtual private network (VPN) remote access. All of these technologies have the potential to open our network perimeter to threats. When we considered the threat of viruses and worms, it was evident that we needed additional controls to secure the enterprise network and its information assets from unauthorized devices and unauthorized people. Figure 1 shows how we could authenticate devices and users as part of the authentication pyramid. Figure 1. Authentication pyramid Info Use Auditing Access......

Words: 1319 - Pages: 6

Security Authentication

...Security Authentication Process CMGT/400 February 9, 2013 Anthony Seymour Security Authentication Process Like most people who are computer users, you do not simply turn on your computer and start accessing programs. There are systems put in place by the user, or the administrator of the network to ensure that the properly authorized people gain access to their information. Specific profiles are created to differentiate amongst the users that allow each unique user to create, delete, and print or any other process they have access to. The process needs to be thoroughly planned out, and there also has to be a determination how whether it will be managed locally, or by third party software. This management of access controls actually comes in four different steps. The steps are: Identification, Authentication, Authorization, and finally, Accountability. No administrator worth his salt will incorporate any sort of security authentication process without these four basic steps. A properly configure authentication process will protect your network from such threats as password cracking tools, brute force attacks, the abuse of system rights and outright impersonation of authenticated users. Identification is the first of the four steps of the security process. Anyone that wishes to gain access to a system is referred to as a supplicant, and the tool that they use to gain entry to the system is referred to as an Identifier. This identifier can be a myriad of different......

Words: 1640 - Pages: 7

Sql Server Authentication

...SQL server authentication (1) SQL server recognizes two different types of authentication: Windows Authentication and SQL Server Authentication. Using Windows Authentication allows users to provide some kind of credentials associated with the windows user accounts built into the domain of your server if it is a windows based system. Using windows authentication provides a more secure environment and is considered integrated security. Each user has a domain log in or account name that is used for windows and then re-used for SQL authentication. The second method of authorization is simply SQL server authentication. This is typically used when there is no access to an active windows domain or an account does not exist for that user to authenticate through windows. You can use what is called a mixed mode authorization and use a combination of both windows and SQL authentication. However, this opens more access points to your database server and therefore less secure and not recommended. Using windows authentication is more secure because it allows for authentication at a domain level and can be managed more easily through active directory accounts and groups. (2) Microsoft Access has several authorization options. These include role-based, identity-based, and resource-based options. Role-based authorization is secured based on the role of the user. All users that fit in the same role......

Words: 304 - Pages: 2

Sql Server Authentication

...Windows Authentication on Microsoft SQL Server Introduction Microsoft SQL Server offers two types of security authentication: SQL Server authentication and Windows authentication. SQL Server authentication authenticates the user to the database using a database user name and password. Windows authentication is also referred to as "Windows Integrated Security" or a "trusted connection" because it relies on the user being authenticated, or “trusted,” by the operating system. Windows authentication is the authentication mode recommended by Microsoft. Windows authentication takes advantage of Windows user security and account mechanisms. By allowing Microsoft SQL Server to share the user name and password used for Windows, users with a valid Windows account can log into Microsoft SQL Server without supplying a user name and password. In addition to a single login within a Windows domain, Windows authentication provides a more secure mechanism for logging into Microsoft SQL Server. Standard Windows security mechanisms also provide the added advantages of auditing, password aging, minimum password length, and account lockout after multiple invalid login requests. The DataDirect Connect® for JDBC® SQL Server driver is the only JDBC driver for Microsoft SQL Server that provides two methods for supporting Windows authentication, a Pure Java (Type 4) implementation and a Windows-specific (Type 2) implementation. The Windows-specific implementation requires minimal configuration to......

Words: 2311 - Pages: 10

Secured Authentication 3d Password

...SECURED AUTHENTICATION: 3D PASSWORD INTRODUCTION: Users nowadays are provided with major password stereotypes such as textual passwords, biometric scanning, tokens or cards (such as an ATM) etc. Current authentication systems suffer from many weaknesses. Textual passwords are commonly used; however, users do not follow their requirements. Users tend to choose meaningful words from dictionary or their pet names, girlfriends etc. Ten years back Klein performed such tests and he could crack 10-15 passwords per day. On the other hand, if a password is hard to guess, then it is often hard to remember. Users have difficulty remembering a password that is long and random appearing. So, they create short, simple, and insecure passwords that are susceptible to attack. Which make textual passwords easy to break and vulnerable to dictionary or brute force attacks. Graphical passwords schemes have been proposed. The strength of graphical passwords comes from the fact that users can recall and recognize pictures more than words. Most graphical passwords are vulnerable for shoulder surfing attacks, where an attacker can observe or record the legitimate user’s graphical password by camera. Token based systems such as ATMs are widely applied in banking systems and in laboratories entrances as a mean of authentication. However, Smart cards or tokens are vulnerable to loss or theft. Moreover, the user has to carry the token whenever access required. Biometric......

Words: 4892 - Pages: 20

Ssl Authentication

...certificate will be different depending on your server. In the image below, you can see what is called the certificate chain. It connects your server certificate to your CA’s (in this case DigiCert’s) root certificate through a series of intermediate certificates. The most important part of an SSL Certificate is that it is digitally signed by a trusted CA like DigiCert. Anyone can create a certificate, but browsers only trust certificates that come from an organization on their list of trusted CAs. Browsers come with a pre-installed list of trusted CAs, known as the Trusted Root CA store. In order to be added to the Trusted Root CA store and thus become a Certificate Authority, a company must comply with and be audited against security and authentication standards established by the browsers. An SSL Certificate issued by a CA to an organization and its domain/website verifies that a trusted third party has authenticated that organization’s identity. Since the browser trusts the CA, the browser now trusts that organization’s identity too. The browser lets the user know that the website is secure, and the user can feel safe browsing the site and even entering their confidential information. How Does the SSL Certificate Create a Secure Connection? When a browser attempts to access a website that is secured by SSL, the browser and the web server establish an SSL connection using a process called an “SSL Handshake” (see diagram below). Note that the SSL Handshake is......

Words: 999 - Pages: 4

Attack Methods of the Authentication Breach

...Attack Methods of the Authentication Breach Limit Privilege; don't give any employee more privileges than the employee absolutely needs to do the job. Most successful authentication security attacks target are known vulnerabilities for which patches already exist; however, continuously monitor your network products. Organizations network produces a continuous stream of audit information: firewalls, intrusion detection systems, routers, servers, printers, etc. Most of it is irrelevant, but some of it contains footprints from successful attacks. According to Fahmida Y. Rashid, Dark Reading, “Treating our adversaries as random and unpredictable is counterproductive. We may be able to reduce the majority of attacks by focusing on a handful of attack patterns,” (¶ 9). Organizations authentication breach were successful arise from some of the following: • Vulnerabilities of Social Networking Sites • Corporate espionage; Risk of information leakage • Vendors’ and suppliers’ security vulnerabilities Vulnerabilities; Ssocial networks are designed to facilitate sharing of personal information, and the more data a person discloses, the more valuable he or she is to the service. Unfortunately, these sites have poor track records for security controls. They don't encourage users to select strong passwords, and passwords on these sites never expire. These exact password are commonly used in organizations. Organizations must encourage the use of a unique password for every web site......

Words: 484 - Pages: 2

Biometric Uid Authentication Using Visual Cryptography

...cryptography:Improving the contrast via the cover base” IACR Eprint archive, 1996. [8] C. Blundo and A. De Santis and D.R. Stinson, “On the contrast in visual cryptography schemes”, Jurnal pf cryptography, vol. 12, pp. 261-289, 1996. [9] G. Ateniese and C. Blundo and A. De Santis and D.R. Stinson,“Extended Schemes for Visual Cryptography”, Theoretical Computer Science, 1996. [10] Z. Zhouand and G. R. Arce and G. Di Crescenzo, “Halftone visual cryptography” IEEE Trans. Image Process, vol. 15, no. 8, pp. 2441-2453, Aug. 2006. [11] C. Blundo and A. De Santis and M. Naor, “Visual cryptography for grey level image”, Information Processing Letters, vol. 75, pp. 255-259, 2000. [12] Y. Rao and Y. Sukonkina and C. Bhagwati and U. Singh, “Fingerprint based authentication application using visual cryptography methods (Improved ID Card)”, in Proc.IEEERegion 10 Conf, pp.1-5, Nov 2008. [13] T. Monoth and B.A. P “Tamperproof transmission of fingerprints using visual cryptography schemes”, Procedia Computer Science,vol. 2, pp. 143-148, 2010. [14] [15] h ttp:// [16] [17] S. J. Shyu. Efficient visual secret sharing scheme for color images. Pattern recognition, 39:866-880, 2006. [18] D.R. Stinson. An introduction to visual cryptography. Public Key Solution '97, pages 28-30, April 1997. [19] J. Daugman.......

Words: 715 - Pages: 3

The Security Authentication Process

...The Security Authentication Process Simply put, authentication is the process by which a subject’s (or user’s) identity is verified (Conklin, White, Williams, Davis, & Cothren, 2012). An example of authentication most people are familiar with is their e-mail login. For instance, Gmail requires a person’s Gmail address and individual password to access his or her Gmail account. However, there are numerous types of authentication outside the common username and password. Furthermore, authentication is used in numerous areas of a system to re-verify a user’s identity when he or she is accessing a new area of the system, accessing encrypted data types, and securing the preservation of a system. This paper evaluates the different authentication types, their applications, and additional security measures for securing a system and its data. Types of Authentication According to Whitman and Mattford (2010), there are four types of authentication mechanisms, which are: * Something a person knows (passwords or passphrases) * Something a person has (such as cryptographic tokens or smartcards) * Something a person is (a fingerprint, retina or iris scan, or hand topography or geometry * Something a person produces (such as voice or pattern recognition) The level of access control associated with a system and the data contained on the system is determined by legislation (varies geographically) governing data, and control policies developed and implemented by......

Words: 1415 - Pages: 6

User Authentication: Doing Us a Disservice

...ANTIA, GODWIN COURSEWORK ASSINGMENT 2013 USER AUTHENTICATION: DOING US A DISSERVICE INTRODUCTION: Several Years ago the growth of internet wasn’t rapidly and there were few limited online application. Today, almost everything that can be done offline has an online counterpart. This goes from simple email, access to paying your bill online (Roger ,M.and Carlos,C., 2007). Therefore, authentication is a process in which a user is asked to identify itself by providing certain details. Authentication has become the most integral part of all web based application nowadays. The most used form of authentication is the password and pin approach. Internet usage and online application are experiencing spectacular growth worldwide; there are over a billion internet users at present which utilises the use of the internet. Authentication is necessary in our everyday business because it will cut down the rate of identity theft and also stabilize confidentiality. User authentication faces a major problem as many security geniuses came out to proof that no single security completely protects users from theft. This essay will describe the limitations that can occur in practice of authenticating a user. It will help improve the reader’s knowledge on issue with authentication process, which is done according to the level of authentication. It will review the state of practice of a user authentication; also evaluate the authentication process with three website such as Facebook, Barclays......

Words: 3317 - Pages: 14

Improving User Authentication on Mobile Devices:

...Improving user authentication on mobile devices: A Touchscreen Graphical Password Summary By: Quaniesha Hillian December 12, 2013 Abstract We analyze three biometric verification modalities – voice, face and motion – and in addition secret word passage, on a portable gadget, to investigate the relative requests on client time, exertion, blunder and errand interruption. Our research center study furnished perceptions of client movements, techniques, and responses to the validation strategies. Face and voice biometrics conditions were speedier than watchword passage. Talking a Pin was the speediest for biometric specimen entrance, yet fleeting memory review was better in the face check condition. None of the confirmation conditions were recognized exceptionally usable. In conditions that consolidated two biometric entrance routines, the opportunity to get the biometric examples was shorter than if obtained independently yet they were extremely disliked and had high memory assignment blunder rates. These quantitative effects exhibit cognitive and engine contrasts between biometric verification modalities, and brief strategy choices in selecting confirmation. Typing text passwords is challenging when using touchscreens on mobile devices and this is becoming more problematic as mobile usage increases. They designed a new graphical password scheme called Touchscreen Multi-layered Drawing specifically for use with touchscreens. They conducted an......

Words: 3240 - Pages: 13

Security Authentication

...Securing and Protecting Information Authentication is a very common aspect of today's technology world. Anyone that uses a computer or mobile device has most likely used some form of it when logging into school accounts, shopping online, using social media, or accessing systems at work. What most individuals do not realize is that there are differing forms of authentication and ways it is used. Additionally, most people will not have any idea what is going on behind the scenes during authentication. He or she only knows that a login ID and password are required to gain access to the system. What is Authentication? The authentication process and other considerations affect the entire design and development for information systems. This and other preventative measures are used for securing data over a variety of systems. In order to learn about the authentication process, first it must be understood what security authentication is. The commonly accepted definition of security authentication is, according to “The business Of Authentication” (n.d.) “…the process of determining if a user or identity is who they claim to be. Authentication is accomplished using something the user knows (e.g. password), something the user has (e.g. security token) or something of the user (e.g. biometric) (para. 1). The important terms here are something the user has and something the user knows. In early authentication processes like automated teller machines (ATM), this idea was......

Words: 1455 - Pages: 6

User Authentication for Network Environment

... CHAPTER ONE INTRODUCTION 1. BACKGROUND OF THE STUDY User authentication for network or internet based environment posed a challenging task for system and network administrator. This statement is true and is still very much applicable till these days as it is a well known fact that authentication is being widely incorporated as part of access control for most systems. Authentication has been the catalyst for business organization in information protection and security. Implementation of access control policies, standards or procedures involves the identification of appropriate authentication mechanism whereby the criticality of the information being protected are being used as justification for having a more refined authentication mechanism as compared to a more simple approach. Without the appropriate authentication mechanism in place, attacker could easily gain access to systems or applications by utilizing personal information, gained through various means, including but not limited to social engineering. Conventional textual passwords are the most common mechanism used in authentication. This method requires a user to enter their username and password, either in alphabet or numeric, or more commonly, a mixture of both forms as authentication tokens to gain access to systems or applications. Two recent surveys have shown that users choose short, simple passwords that are easily guessable, for example, “password”, personal names of family members,......

Words: 17307 - Pages: 70

Biometric Authentication System

...Biometric Authentication System for Information Security Objective To explain about biometric system that can be used by the organization. By understand the biometric differences; organization can decide which technique is the most suitable for the business. Methodology The method used to know about biometric is scientific literature which will develop quantitative identification as the measurement for the authentication. Outcome To give better understanding about biometric system, biometric techniques as well as the advantages and disadvantages of biometric use in organization. Conclusion Organization can understand better value of biometric system and what is needed to implement the biometric system into the company. Keywords Biometrics CHAPTER I INTRODUCTION 1.1 Background Since January 2008, the technology had developed rapidly causing the world advancing towards a new era. A survey on 2008 had estimated about 541.7 million computers are connected in more than 250 countries on every continent even Antarctica. The internet is not a single network but it is a worldwide network that connected every individual computer hosts to network connection, in a variety ways. Thus, individuals and organizations can reach the internet without regard to national or geographic boundaries or time of day. However, along with the advantages and easy access to get information, there are also many risks such as the valuable information will be lost, stolen, changed or......

Words: 5215 - Pages: 21

Fingerprint Biometric Authentication for Enhancing Staff Attendance System

...International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868 Foundation of Computer Science FCS, New York, USA Volume 5– No.3, February 2013 – Fingerprint Biometric Authentication for Enhancing Staff Attendance System Oloyede Muhtahir O. Dept. of Info. and Comm. Science University of Ilorin, Ilorin. Adedoyin Adeyinka O. Dept. of Info. and Comm. Science University of Ilorin, Ilorin. ABSTRACT Biometric technology that involves the identification and verification of individuals by analyzing the human body characteristics has been widely used in various aspect of life for different purposes, most importantly as regards this study the issue of staff attendance. Despite the numerous advantages of the biometric system and its impact to various work sectors across the globe, most biometric technology users face the issue of defining the right and accurate biometric technology system that will be cost effective in solving particular problems in specific environment. In this paper, a study was conducted using a telecommunication company in the South West region of Nigeria, in order to determine the specific biometric identifier that can be used to enhance their traditional staff attendance system which presently affects the productivity of the organization. The study was conducted using a quantitative approach by designing a questionnaire as the data collection instrument based on different biometric technologies. The......

Words: 4926 - Pages: 20

Barry Pepper | Au service de la france | Amalou Lights 3