Friday, March 1, 2013

Security Authentication Process

security Authentication Process
Benjamin Stites
CMGT/400
August 20 2012
University of Phoenix

Security Authentication Process
The security certificate Process helps to prove the personal identity of an entity that needs access to a certain business need. The mathematical process proves that they entity is who the entity say they are. There are four types of authentication chemical mechanisms that give the axe be used in the process. These mechanisms are as follows: Something You Know, Something You Have, Something You Are, and Something You Produce. (microsoft.com, Marc) A company may choose to use one mechanism or a combination of the mechanisms.

The authentication process is some secure when done in six processing affairs. The world-class let on is to create a storage parole policy. This room to make sure all users have a password that is hard to guess. This is done by using both move and upper case letters, and by using numbers and symbols in the password as well. (Whitman & Mattord, 2010) The second part is establishing the consider lock pop policy. This means to determine how long a user croupe stay logged in, how long the dodge stays on aft(prenominal) the user hit the lockout sequence, and how many times a user can get their password wrong until the system locks out the account and the user has to create a new one.

Order your essay at Orderessay and get a 100% original and high-quality custom paper within the required time frame.

The tercet part is assigning log on hours which determine what time of day and how long a user can be logged on. The fourth is creating the ticket expiration policy. This means to create a maximum and minimum lifetime for ticket expiration so attackers cannot crack the encryption, and so it does not overload the network. The fifth part is establishing network authentication standards to insure security. The six and final part is clock synchronization tolerance to prevent replay attacks.

trope Process
When designing a new Information System the authentication process can be used to make the system secure. The development team will need to take this into...If you take to get a full essay, order it on our website: Orderessay



If you want to get a full essay, wisit our page: write my essay .

No comments:

Post a Comment