ESSENTIALS OF MIS LL W/ ACCESS <C>
13th Edition
ISBN: 9781323916438
Author: LAUDON
Publisher: PEARSON C
expand_more
expand_more
format_list_bulleted
Question
Chapter 8, Problem 1IQ
Program Plan Intro
System vulnerability:
- When huge data amounts are been kept in electronic form, it becomes susceptible to many threats.
- The
information systems in many locations are been interconnected through communication networks. - The unauthorized access can occur at many access points in network and is not limited to single location.
- The data flowing over networks could be accessed; valuable information could be stolen while transmission or data could be altered without authorization.
- The denial-of-service attacks are launched by intruders to disrupt website operations.
- Internets are vulnerable than internal networks as it is open to everyone.
Expert Solution & Answer
Explanation of Solution
Authentication and Identity management:
- The Identity management (ID management) denotes an organizational process to identify, authenticate and authorize individuals to have access to information.
- The information includes applications, networks with user rights and other company information.
- It includes authenticating of users and to determine whether they are allowed access to particular system.
- It determines whether a user has access to systems but also sets access level and permission level for users.
- It includes control over process of authorizing system or network permissions for existing users.
- It includes off boarding of users who are no longer authorized for access to organization system.
- Authentication denotes a process of recognizing identity of a user.
- It denotes a method to associate an inbound request with identifying credential set.
- The credentials delivered are compared with values of file in a
database of authorized information of user within authentication server. - It has two different phases, identification as well as actual authentication.
- The identification phase would provide a user identity to security system.
- This identity is been provided in form of a user ID.
Working with IT security systems:
- Yes, have worked with IT security systems and identity management.
- The job nature was to ensure proper working of systems in an organization.
Nature of work with software:
- The job nature was to ensure proper working of systems in an organization.
- The proper updating of virus protection software and system updates was a responsibility.
- The scheduled back up schemes is to be controlled and managed.
- To ensure proper working of software present in organization.
- To ensure credentials provided by user matches with that of access file database.
Want to see more full solutions like this?
Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
Could you explain a challenge-and-response authentication system? (CRAS). Why is this authentication mechanism safer than passwords?
Explain what what is meant by the phrase "authentication challenge–response system." Why is this system more safe than one that relies on passwords when compared to others?
Could you provide your own explanation of what a challenge-and-response authentication system is and how it works? (CRAS). Why is this way of authentication more secure than the traditional technique of using a password?
Chapter 8 Solutions
ESSENTIALS OF MIS LL W/ ACCESS <C>
Ch. 8.1 - Prob. 1CQ1Ch. 8.1 - Prob. 2CQ1Ch. 8.1 - Prob. 3CQ1Ch. 8.1 - Prob. 4CQ1Ch. 8.4 - Prob. 1CQ2Ch. 8.4 - Prob. 2CQ2Ch. 8.4 - Prob. 3CQ2Ch. 8.4 - Prob. 4CQ2Ch. 8 - Prob. 1IQCh. 8 - Prob. 2IQ
Ch. 8 - Prob. 3IQCh. 8 - Prob. 4IQCh. 8 - Prob. 5IQCh. 8 - Prob. 1RQCh. 8 - Prob. 2RQCh. 8 - Prob. 3RQCh. 8 - Prob. 4RQCh. 8 - Prob. 5DQCh. 8 - Prob. 6DQCh. 8 - Prob. 7DQCh. 8 - Prob. 8HMPCh. 8 - Prob. 9HMPCh. 8 - Prob. 11CTPCh. 8 - Prob. 12CTPCh. 8 - Prob. 13CSQCh. 8 - Prob. 14CSQCh. 8 - Prob. 15CSQCh. 8 - Prob. 16CSQCh. 8 - Prob. 17MLMCh. 8 - Prob. 18MLM
Knowledge Booster
Similar questions
- Could you provide your own definition of a challenge-and-response authentication system? (CRAS). Why is this technique of authentication more secure than using a password?arrow_forwardHow does multifactor verification work? What is it? How does it help keep your password safe?arrow_forwardPlease enlighten me as to the importance of creating a challenge-response authentication system. In what ways are password-based systems less secure than this?arrow_forward
- Describe the concept of a challenge-and-response authentication system (CRAS). What makes this method more secure compared to others that rely on passwords?arrow_forwardPlease explain what a challenge-response authentication system is in your own words, if you can. In what ways is it more secure than a password-based system?arrow_forwardCould you define a challenge-and-response authentication system in your own words? (CRAS). Why is this authentication process more secure than a password-based one?arrow_forward
- Could you explain the concept of a challenge-and-response authentication system in your own words so I can better comprehend it? (CRAS). What makes this authentication method more secure than password-based methods?arrow_forwardWhat does a challenge-and-response authentication method mean exactly? (CRAS). Why is this technique more secure than others that use passwords?arrow_forwardWhat is a challenge–response system for authentication? Describe it here. When compared to a password-based system, why is this one more secure?arrow_forward
- Could you define a challenge-and-response authentication system in your own words? (CRAS). Why is this authentication method more secure than password-based authentication?arrow_forwardCould you explain a challenge-and-response authentication system in your own words? (CRAS). What distinguishes this authentication from password-based ones?arrow_forwardPlease, could you describe the idea of a challenge-and-response authentication system to me in your own words? (CRAS). What makes this technique safer than password-based authentication?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning