preview

The Human And Imaginative Aspects Of Cyber Threats

Good Essays

Intro In an age of rapidly growing informational data and highly talented black hat hackers, technological headways present the critical duality of major opportunity and critical risk. A universities high-value sensitive data is indispensable to both, and a key asset that differentiates organizations. While it is impractical to keep it ‘locked down’ and yet open, its utilization can undermine the organization 's existence. Subsequently, the challenge for IT team security personnel and college executives is striking a delicate posture being security aware and remaining business driven. The human and imaginative aspects of cyber threats changed dramatically in the previous years. Witnessing innovative techniques blended with …show more content…

Identification is the first of the four steps in this process. Any user that expects to gain access to a system referred to as a supplicant, and the tool that every user who gains entry to the network, referred to as an Identifier. The identifier can have numerous different methods for identifying the supplicant. The identifier should be able to locate the users ' credentials from a database of unique information that determines the supplicants ' identity. The most common form of verification is through using the employees first and last name. In case there happen to be colleagues with common names, such as John Doe, employee Id 's or Social Security numbers remain utilized. In a good number of companies, they are no longer using the employee 's Social Security number to identify them in their system. They are replacing them with an employee ID. This reduces the information that a network intruder (also known as a hacker) or another employee gaining access to their Social Security numbers. Authentication is the second step in this process. Once identification of the employee is established, there will be a request for input from that user. That will either corroborate to the system that he or she is who they claim to be or that they are not who they claim to be.
The complexity of the authentication process depends on the type of information that needs

Get Access