Protecting Information Systems : Secure Confidential Data And Identify System Vulnerabilities

1428 WordsNov 17, 20156 Pages
Securing and Protecting Information Failure to adequately secure confidential data and identify system vulnerabilities is a serious problem for today Amazon’s web store environment. Common weaknesses used by cyber criminals account for millions of dollars in losses each year. Confidential data lost through vulnerabilities within a computer or network causes critical harm to individuals and to Amazon each day. Security Authentication Process Security authentication is a process used to ascertain and identify a person or organization. The authentication process uses security controls to ensure accurate identification is attained from the entity requesting access to the file, folders, networks, intranets, etc. The most common form of authentication is through the use of logins and passwords, although more and more security personnel are realizing that in today’s economic climate, this is just not enough security to protect information systems and the valuable data that reside on them. Information systems encompass an enterprise security architecture composed of a top-down set of identified trust modules that define the infrastructure for the system. Prioritizing security threats for each module add an appropriate security level to help mitigate potential security breaches during the authentication process. Challenges reveal themselves and are apparent when a high level of security restricts greater usability by individuals. Therefore, much resistance is voiced from

More about Protecting Information Systems : Secure Confidential Data And Identify System Vulnerabilities

Open Document