Preview

2nf Authentication Better Than 1nf

Better Essays
Open Document
Open Document
1281 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
2nf Authentication Better Than 1nf
Is two factor authentication better than one-factor authentication? Critically appraise this using concept of security goals and implementation. OP- 10% orAssignment- 15%

The impact of the internet over the last few years has meant fundamental changes in the way we access the information. Though the network security perimeter has crumbled at all levels, the number of users wanting network access has grown. While there are enormous productivity benefits available from increased access, the security risks have greatly increased. Growing threats to security (e.g. phishing, personal identify fraud) and the personal nature of the data make the balance between security, trust and usability vital. Adams and Sasse (1999) identified the importance for security (in particular security mechanisms) of real world cues that enable users to interpret potential security risks in their interaction with sensitive information. Security threats are increasing day by day and to protect security is becoming a major concern. The different types of attacks are shown in Fig 1.

[pic]

Fig 1 Security threats- the types of attacks
Source: https://akela.mendelu.cz/~lidak/share/izk/2008/lecture5-security.ppt It is important to provide security mechanisms that ensure that the system’s security goals are enforce despite threats from attackers. The attacks are leaded against security goals such as: - Interruption damages availability - Modification damages integrity - Interception damages privacy - Falsification damages authenticity In fact some real attacks damage more security goals. For example: viruses can violate integrity and availability of PC’s SW equipment. To ensure the confidentiality integrity and availability of information, it is important to identify with whom you are dealing, and that the data you are receiving is trustworthy .So it is important to safeguard the security goals such as confidentiality, availability, integrity, authenticity,

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Good Essays

    I would like to start off by saying that there are various threats when discussing about computer security the word threat would mean something that can indicate a danger when in relation to computer security. In this task I will be showing the Malicious damage, counterfeit goods, (software/hardware) human errors, phishing and hacking, theft of equipment, threats related to e – commerce and technical failure.…

    • 1232 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Information Technology is advancing and growing by the minute. Without encryption, credentials sent can be easily intercepted and read by hackers, causing "irreparable damage" to the user and the website owner 's reputation (Eugene Teo, senior manager of security response at security software firm Symantec Singapore, 2014). Security will include monitoring internet behavior, login and log on password rules, software update, and privacy of information.…

    • 688 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Olzak, T. & Bunter, B. (2010, May 07). Security basics - components of security policies. Bright…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    References: 1. (2010). Principles of Computer Security: CompTIA Security+ and Beyond (2nd ed.). : McGraw-Hill.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    The authentication process is a necessity for safeguarding systems against various forms of security threats, such as password-cracking tools, brute-force or wordbook attacks, abuse of system access rights, impersonation of attested users, and last but not least reply attacks just to name a few. In addition, it is imperative that authentication policies are interchangeable with the organizations in which information is being exchanged if resources are being shared between alternative organizations.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Therefore after adding more security to authentication, the effect is witnessed through reduction in the acceptance rate of users while increasing the usability. Consequently, it is very challenging to find the most secure system of authentication that the users can accept. Users are always seeking new features and applications whose interfaces will be easy to use. At the same time, these users express worries that the dangers continues to increase. In addition, the legislations continue to punch companies and manufacturers towards protection of their clients’…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Good Essays

    By implementing the information security characteristic would also be productive and non-cost efficient. In each scenario the attacker’s goal was not proposed for financial gain, but due to a political or personal dispute. So, by establishing a security system to defend critical data, such as alarm codes, safe blends, and other important documentation would not have been affective in any of the giving situations.…

    • 1047 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Security is an ever moving target that must be continually managed and refined to ensure appropriate confidentiality, integrity, and availability of services and systems that are critical to business, as well as the valuable data.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Better Essays

    References: Conklin, W. A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of computer security: CompTIA Security+™ and beyond (3rd ed.). New York, NY: McGraw Hill.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Danger Of Homelessness

    • 277 Words
    • 2 Pages

    Rarely would we be able to accomplish immaculate security: no reasonable dangers and no exercisable vulnerabilities. Now and then we neglect to perceive a risk, or different times we might be not able or unwilling to close a defenselessness. Inadequate security is not an awful circumstance; rather, it shows an exercise in careful control: Control certain dangers and vulnerabilities, apply countermeasures that are sensible, and acknowledge the danger of damage from uncountered cases.…

    • 277 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    People often trust the internet too much when it comes to buying things or sending out their personal information. One does not take into account that there are hackers waiting to scam you for all your money and information. IN an article titled, “Information Security Breaches and the Threat to Consumers” written by Fred H. Cate, he states, “Consumers often end up unwittingly providing thieves with access to sensitive data by failing to secure their own data, by responding to fraud schemes, such as phishing and pharming, and by careless use of their personal information” (Cate 4). In other words, people tend to trust that what they put on the internet, however there are people who are trying to scam you for your money. People should be more aware and less careless about what they are sending through the internet and to who they are sending it to. While we continue to be careless with our information, we continue to see many crimes involving identity theft. Cate writes, “The vulnerability of unsecured personal data and the threat of identity-based frauds nevertheless continue to grow and evolve as perpetrators become more sophisticated in how they seek to obtain and exploit personal information” (Cate 2). It makes it easy for hackers to catch and use one’s personal information when the individual continues to be careless with their information…

    • 1108 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Password Pattern Analysis

    • 1509 Words
    • 7 Pages

    References: [1] Marbridge Consulting. Rumor: Online Community CSDN.net Suffers Data Breach, Techweb. http://www.marbridgeconsulting.com/marbridgedaily/2011-12-22/article/52430/rumor_online_co mmunity_csdnnet_suffers_data_breach December, 2011 [2] GAW, S., ANDFELTEN, E. W. Password management strategies for online accounts. In Proceedings of the second symposium on Usable privacy and security (New York, NY, USA, 2006), SOUPS ’06, ACM, pp. 44–55. [3] SHAY, R., KOMANDURI, S., KELLEY, P., LEON, P., MAZUREK, M., BAUER, L., CHRISTIN, N., ANDCRA-NOR, L. Encountering stronger password requirements: user attitudes and behaviors. In Proc. SOUPS’10(2010). [4] KUO, C., ROMANOSKY, S., ANDCRANOR, L. F. Human selection of mnemonic phrase-based passwords. In Symposium on Usable Privacy and Security(2006), pp. 67–78. [5] PROCTOR, R. W., LIEN, M.-C., VU, K.-P. L., SCHULTZ, E. E., ANDSALVENDY, G. Improving computer security for authentication of users: Influence of proactive password restrictions. Behavior Res. Methods, Instruments, & Computers 34, 2 (2002), 163–169. [6] VU, K.-P. L., PROCTOR, R. W., BHARGAV-SPANTZEL, A., TAI, B.-L. B., ANDCOOK, J. Improving password security and memorability to protect personal and organizational information. Int. J. of Human-Comp. Studies 65, 8 (2007), 744–757. [7] SHANNON, C. E. A mathematical theory of communication. Bell Syst. Tech. J. 27(1949), 379–423,623–656. [8] SHANNON, C. E. A mathematical theory of communication. Bell Syst. Tech. J. 27(1949), 379–423,623–656.…

    • 1509 Words
    • 7 Pages
    Powerful Essays

Related Topics