Free Essay

Authentication

In:

Submitted By nmg123456
Words 795
Pages 4
When it came to writing the report it was definitely a long and tedious process. The way I attacked it was that I chose a topic, which was assisting in the redesign of a community association web site. Once that was determined I made sure to give myself plenty of time to get the report done. I took it one day at a time and made sure that everything I wrote was thorough and to the point. I broke down the information I gathered in to different sections such as what were the needs, requirements, what was a plausible idea and what options were just not obtainable. I completed one section at a time, and then I went through an found supporting references for specific items in my report. I organized the information in a way that flowed and made the report easy to read, I wanted to make sure that it went in order and the audience was aware of what was happening and that they were well informed of the information I was putting forth. I did my audience analysis after I completed my proposal. There was no real reason why I did it this way it just made sense to me to put my thoughts on paper and then decide what kind of audience I was addressing.

What I have learned from developing these reports is that it actually takes a lot longer then I thought it would take. I thought I would be able to sit down one day and put everything together in that one sitting. Was I wrong and I’m glad that I realized that early on, because if I had put this off to the last minute I would be suffering. You really have to do research and take notes and get to the basics, in my case of trying to develop a web site. I had to look up the aspects of what it takes for a company for put together a site. I looked in to average prices of what it cost to pay a company to do a web site, time lines for construction, and what were the best options for picking design and layout options.

The way I organized my information was pretty simple I laid it out in a way that would make sense as read and so that you could understand what was happening. It was basically step-by-step: the needs, wants, and requirements. Then I explained what those needs and want were in detail, and how those requirements were going to be fulfilled. Then I broke it down even more to how much everything would cost and how long each aspect of the implementation, hosting and maintaining would take. I think if I presented it any other way it would be confusing for the audience. The graphic I chose obviously coordinates with my report. Whenever graphics are presented they should always represent what you have written. Non-supported graphics can throw the audience off, should they be focusing on the image or the text, since they are two different concepts that have nothing to do with each other.

I never really thought about my audience when I wrote papers, I just did the assignment that was asked of me and fulfilled all the requirements. So when part of the report was to do an audience analysis it was an eye opener to me. I need to make sure when I write about topics that may not be well known that I need to elaborate on ideas or terms that might need more definition or explanation so that my audience no matter who that may be will be able to read my report, article, recommendation and not have to question or second guess what I’m trying to present.

After taking this class it has taught me to write appropriately for my audience, to put in the extra time and get the references that make you report that much more creditable and being organized is the key to success. All of these tactics I can and will apply in my future professional, academic and personal works. The things I learned in the class are going to pivotal attributes in my future work place, since I plan to earn my degree in business management. I learned how to put together a proposal, make sure my audience is being spoken to in an appropriate context. I also learned how to present a progress report on the status of any project that comes across my path, and then final wrapping it up all with an analytical report. I can guarantee that I will have to use these tools in my future and I can feel 100% confident in my work having taken this class.

Similar Documents

Premium Essay

Security Authentication

...Security Authentication Process CMGT/400 February 9, 2013 Anthony Seymour Security Authentication Process Like most people who are computer users, you do not simply turn on your computer and start accessing programs. There are systems put in place by the user, or the administrator of the network to ensure that the properly authorized people gain access to their information. Specific profiles are created to differentiate amongst the users that allow each unique user to create, delete, and print or any other process they have access to. The process needs to be thoroughly planned out, and there also has to be a determination how whether it will be managed locally, or by third party software. This management of access controls actually comes in four different steps. The steps are: Identification, Authentication, Authorization, and finally, Accountability. No administrator worth his salt will incorporate any sort of security authentication process without these four basic steps. A properly configure authentication process will protect your network from such threats as password cracking tools, brute force attacks, the abuse of system rights and outright impersonation of authenticated users. Identification is the first of the four steps of the security process. Anyone that wishes to gain access to a system is referred to as a supplicant, and the tool that they use to gain entry to the system is referred to as an Identifier. This identifier can be a myriad of different references...

Words: 1640 - Pages: 7

Premium Essay

Security Authentication

...Securing and Protecting Information Authentication is a very common aspect of today's technology world. Anyone that uses a computer or mobile device has most likely used some form of it when logging into school accounts, shopping online, using social media, or accessing systems at work. What most individuals do not realize is that there are differing forms of authentication and ways it is used. Additionally, most people will not have any idea what is going on behind the scenes during authentication. He or she only knows that a login ID and password are required to gain access to the system. What is Authentication? The authentication process and other considerations affect the entire design and development for information systems. This and other preventative measures are used for securing data over a variety of systems. In order to learn about the authentication process, first it must be understood what security authentication is. The commonly accepted definition of security authentication is, according to “The business Of Authentication” (n.d.) “…the process of determining if a user or identity is who they claim to be. Authentication is accomplished using something the user knows (e.g. password), something the user has (e.g. security token) or something of the user (e.g. biometric) (para. 1). The important terms here are something the user has and something the user knows. In early authentication processes like automated teller machines (ATM), this idea was used...

Words: 1455 - Pages: 6

Free Essay

The Security Authentication Process

...The Security Authentication Process Simply put, authentication is the process by which a subject’s (or user’s) identity is verified (Conklin, White, Williams, Davis, & Cothren, 2012). An example of authentication most people are familiar with is their e-mail login. For instance, Gmail requires a person’s Gmail address and individual password to access his or her Gmail account. However, there are numerous types of authentication outside the common username and password. Furthermore, authentication is used in numerous areas of a system to re-verify a user’s identity when he or she is accessing a new area of the system, accessing encrypted data types, and securing the preservation of a system. This paper evaluates the different authentication types, their applications, and additional security measures for securing a system and its data. Types of Authentication According to Whitman and Mattford (2010), there are four types of authentication mechanisms, which are: * Something a person knows (passwords or passphrases) * Something a person has (such as cryptographic tokens or smartcards) * Something a person is (a fingerprint, retina or iris scan, or hand topography or geometry * Something a person produces (such as voice or pattern recognition) The level of access control associated with a system and the data contained on the system is determined by legislation (varies geographically) governing data, and control policies developed and implemented by the...

Words: 1415 - Pages: 6

Premium Essay

Sql Server Authentication

...SQL server authentication (1) SQL server recognizes two different types of authentication: Windows Authentication and SQL Server Authentication. Using Windows Authentication allows users to provide some kind of credentials associated with the windows user accounts built into the domain of your server if it is a windows based system. Using windows authentication provides a more secure environment and is considered integrated security. Each user has a domain log in or account name that is used for windows and then re-used for SQL authentication. The second method of authorization is simply SQL server authentication. This is typically used when there is no access to an active windows domain or an account does not exist for that user to authenticate through windows. You can use what is called a mixed mode authorization and use a combination of both windows and SQL authentication. However, this opens more access points to your database server and therefore less secure and not recommended. Using windows authentication is more secure because it allows for authentication at a domain level and can be managed more easily through active directory accounts and groups. http://sqlchicken.com/2009/09/sql-university-basic-tools/ (2) Microsoft Access has several authorization options. These include role-based, identity-based, and resource-based options. Role-based authorization is secured based on the role of the user. All users that fit in the same role will...

Words: 304 - Pages: 2

Premium Essay

Multi-Factor Authentication

...Question: Since HIPAA requires Multi-Factor Authentication for users to access our networks remotely, what’s the difference between single channel Multi-Factor and dual channel Multi- Factor Authentication? Additionally, is there a cost difference between both? Answer: The use of multi-factor authentication to prove one’s identity is based on the premise that an unauthorized actor is unlikely to be able to supply the factors required for access. If, in an authentication attempt, at least one of the components is missing or supplied incorrectly, the user’s identity is not established with sufficient certainty and access to the asset (network, website or data) being protected by multifactor authentication then remains blocked. The authentication...

Words: 839 - Pages: 4

Premium Essay

User Authentication for Network Environment

...CHAPTER ONE INTRODUCTION 1. BACKGROUND OF THE STUDY User authentication for network or internet based environment posed a challenging task for system and network administrator. This statement is true and is still very much applicable till these days as it is a well known fact that authentication is being widely incorporated as part of access control for most systems. Authentication has been the catalyst for business organization in information protection and security. Implementation of access control policies, standards or procedures involves the identification of appropriate authentication mechanism whereby the criticality of the information being protected are being used as justification for having a more refined authentication mechanism as compared to a more simple approach. Without the appropriate authentication mechanism in place, attacker could easily gain access to systems or applications by utilizing personal information, gained through various means, including but not limited to social engineering. Conventional textual passwords are the most common mechanism used in authentication. This method requires a user to enter their username and password, either in alphabet or numeric, or more commonly, a mixture of both forms as authentication tokens to gain access to systems or applications. Two recent surveys have shown that users choose short, simple passwords that are easily guessable, for example, “password”, personal names of family members, names...

Words: 17307 - Pages: 70

Free Essay

Improving User Authentication on Mobile Devices:

...Improving user authentication on mobile devices: A Touchscreen Graphical Password Summary By: Quaniesha Hillian December 12, 2013 Abstract We analyze three biometric verification modalities – voice, face and motion – and in addition secret word passage, on a portable gadget, to investigate the relative requests on client time, exertion, blunder and errand interruption. Our research center study furnished perceptions of client movements, techniques, and responses to the validation strategies. Face and voice biometrics conditions were speedier than watchword passage. Talking a Pin was the speediest for biometric specimen entrance, yet fleeting memory review was better in the face check condition. None of the confirmation conditions were recognized exceptionally usable. In conditions that consolidated two biometric entrance routines, the opportunity to get the biometric examples was shorter than if obtained independently yet they were extremely disliked and had high memory assignment blunder rates. These quantitative effects exhibit cognitive and engine contrasts between biometric verification modalities, and brief strategy choices in selecting confirmation. Typing text passwords is challenging when using touchscreens on mobile devices and this is becoming more problematic as mobile usage increases. They designed a new graphical password scheme called Touchscreen Multi-layered Drawing specifically for use with touchscreens. They conducted an exploratory...

Words: 3240 - Pages: 13

Premium Essay

Network Access Control: User and Device Authentication

...Manufacturing Enterprise Security Network Access Control: User and Device Authentication August 2005 Intel IT is piloting new security methods to provide network access control by authenticating devices as well as users. Since networking has evolved to support both wired and wireless access, securing corporate networks from attack has become ever more essential. Therefore, to effectively enforce network access control policies in a proactive manner, we are developing a method to authenticate users and devices before they connect to the network. Network Access Control at Intel • Over 90,000 employees worldwide • 80 percent of knowledge workers are mobile and unwired • Over 50,000 remote access users Background As a global corporation, Intel IT supports more than 90,000 employees and contractors all over the world, and 80 percent of our knowledge workers are mobile and unwired. Network access depends more and more upon wireless LANs and WANs, as well as virtual private network (VPN) remote access. All of these technologies have the potential to open our network perimeter to threats. When we considered the threat of viruses and worms, it was evident that we needed additional controls to secure the enterprise network and its information assets from unauthorized devices and unauthorized people. Figure 1 shows how we could authenticate devices and users as part of the authentication pyramid. Figure 1. Authentication pyramid Info Use Auditing Access Control User Device Authentification...

Words: 1319 - Pages: 6

Free Essay

Secured Authentication 3d Password

...SECURED AUTHENTICATION: 3D PASSWORD INTRODUCTION: Users nowadays are provided with major password stereotypes such as textual passwords, biometric scanning, tokens or cards (such as an ATM) etc. Current authentication systems suffer from many weaknesses. Textual passwords are commonly used; however, users do not follow their requirements. Users tend to choose meaningful words from dictionary or their pet names, girlfriends etc. Ten years back Klein performed such tests and he could crack 10-15 passwords per day. On the other hand, if a password is hard to guess, then it is often hard to remember. Users have difficulty remembering a password that is long and random appearing. So, they create short, simple, and insecure passwords that are susceptible to attack. Which make textual passwords easy to break and vulnerable to dictionary or brute force attacks. Graphical passwords schemes have been proposed. The strength of graphical passwords comes from the fact that users can recall and recognize pictures more than words. Most graphical passwords are vulnerable for shoulder surfing attacks, where an attacker can observe or record the legitimate user’s graphical password by camera. Token based systems such as ATMs are widely applied in banking systems and in laboratories entrances as a mean of authentication. However, Smart cards or tokens are vulnerable to loss or theft. Moreover, the user has to carry the token whenever access required. Biometric scanning...

Words: 4892 - Pages: 20

Premium Essay

User Authentication: Doing Us a Disservice

...ANTIA, GODWIN COURSEWORK ASSINGMENT 2013 USER AUTHENTICATION: DOING US A DISSERVICE INTRODUCTION: Several Years ago the growth of internet wasn’t rapidly and there were few limited online application. Today, almost everything that can be done offline has an online counterpart. This goes from simple email, access to paying your bill online (Roger ,M.and Carlos,C., 2007). Therefore, authentication is a process in which a user is asked to identify itself by providing certain details. Authentication has become the most integral part of all web based application nowadays. The most used form of authentication is the password and pin approach. Internet usage and online application are experiencing spectacular growth worldwide; there are over a billion internet users at present which utilises the use of the internet. Authentication is necessary in our everyday business because it will cut down the rate of identity theft and also stabilize confidentiality. User authentication faces a major problem as many security geniuses came out to proof that no single security completely protects users from theft. This essay will describe the limitations that can occur in practice of authenticating a user. It will help improve the reader’s knowledge on issue with authentication process, which is done according to the level of authentication. It will review the state of practice of a user authentication; also evaluate the authentication process with three website such as Facebook, Barclays bank...

Words: 3317 - Pages: 14

Free Essay

Alternative to Two Factor Authentication

...A good alternative to two factor authentication would be something like the FortiGate Series. This is a series that consist of hardware firewalls designed to protect computer networks from abuse basically. They will reside between the network they are protecting and an external network like the internet. This FortiGate Series will span the full range of network environments, from the small office and home office to the service provider, offering cost-effective systems for any application. They can detect and eliminate damaging, content-based threats from email and Web traffic such as viruses, worms, intrusions, and inappropriate Web content in real-time without degrading network performance, which is something I would be looking for. In addition to it providing application-level protection, the FortiGate Series can deliver a full range of network-level services which include firewall, Virtual Private Network, intrusion prevention and traffic shaping in a dedicated, easily managed platform. The FortiGate series provides a NAT/route mode that will apply security features between two or more different networks and a transparent mode that applies security features at any point in a network, which is a huge plus. A FortiGate unit will consist of a hardware box and the custom firewall software FortiOS, A separate administrator console will be used to perform system administration. This firewall can operate either alone or as part of a firewall cluster in order to provide a high...

Words: 594 - Pages: 3

Premium Essay

Ssl Authentication

...SSL (Secure Sockets Layer) is a standard security technology for establishing an encrypted link between a server and a client—typically a web server (website) and a browser; or a mail server and a mail client (e.g., Outlook). SSL allows sensitive information such as credit card numbers, social security numbers, and login credentials to be transmitted securely. Normally, data sent between browsers and web servers is sent in plain text—leaving you vulnerable to eavesdropping. If an attacker is able to intercept all data being sent between a browser and a web server they can see and use that information. More specifically, SSL is a security protocol. Protocols describe how algorithms should be used; in this case, the SSL protocol determines variables of the encryption for both the link and the data being transmitted. SSL secures millions of peoples’ data on the Internet every day, especially during online transactions or when transmitting confidential information. Internet users have come to associate their online security with the lock icon that comes with an SSL-secured website or green address bar that comes with an extended validation SSL-secured website. SSL-secured websites also begin with https rather than http. All browsers have the capability to interact with secured web servers using the SSL protocol. However, the browser and the server need what is called an SSL Certificate to be able to establish a secure connection. SSL Certificates have a key pair: a public and...

Words: 999 - Pages: 4

Premium Essay

Securing and Protecting Information

...sophisticated over time. With the increase in threat levels, stronger legislations are being increasingly issued to prevent further attacks. Most of these measures have been aimed at increasing the security of Internet information. Among these methods, the most prominent approach is security authentication and protection. This paper comprehensively evaluates the security authentication process. The paper also introduces security systems that help provide resistance against common attacks. Security Authentication Process Authentication is the process that has increasingly been utilized in verification of the entity or person. Therefore, this is the process utilized in determining whether something or someone is what it is declared to be (LaRoche, 2008). Authentication hence acts as part of numerous online applications. Before accessing an email account, the authentication process is incorporated in identification of the foreign program. Therefore, the most common authentication application is done through incorporation of passwords. Before description of the authentication process, it is important to explain some of the important terms. In this concept, the term AAA is commonly employed to mean authentication, accounting, and authorizations. Let us now...

Words: 1094 - Pages: 5

Premium Essay

Securing and Protecting Information

...access enables users outside a network access and provides privileges based on the security settings. Users are able to access resources through an internet service provider or ISP which is connecting remotely to the resources online. Secure connectivity is able to be done due to an authentication process, this process establishes a user’s identification to enable access and grant permissions. There are several ways to establish a network connection based on the software, hardware, and network type and security requirements. Security authentication Wireless devices are able to connect remotely involving two elements: a temporary network connection and a series of protocols that set the privileges and commands. The temporary network connection, occurred through a wired connection or wireless access, or any other method of connecting to a network. The primary issue is authenticating the identity of the user and establishing proper privileges for that user. This is accomplished using a combination of protocols and the operating system on the host machine. The three steps in the establishment of proper privileges are authentication, authorization, and accounting, also known as AAA. Authentication is the matching of user-supplied credentials to previously stored credentials on a host machine, and it usually involves an account username and password. Once the user is authenticated, the authorization step takes place. Authorization is the granting of specific permissions based...

Words: 1275 - Pages: 6

Premium Essay

Student Registration System

...E­Commerce (Aug­Dec 2009) Term Paper Name: MANILA M V Roll No: CS08M028 Title: Three­Dimensional Password for More  Secure Authentication Goal The   goal   is   to   design   a   multi   factor   authentication   scheme   that  combines the the various authentication scheme into a single 3D virtual environment  which results in a larger password space. The design of 3D virtual environment, the  selection of object inside the environment, and the object type reflect the resulted  password space. User have freedom to select whether the 3­D password will be solely  recall, recognition, or token based, or combination of two schemes or more.  Brief Description of the System The proposed system is a multi factor authentication scheme. It can  combine all existing authentication schemes into a single 3­D virtual environment.  This 3­D virtual environment contains several objects or items with which the user  can interact. The user is presented with this 3­D virtual environment where the  user  navigates and interacts with various objects. The sequence  of actions and interactions  toward the objects inside the 3­D environment constructs the user’s 3­D password.  The 3­D password  can combine most existing authentication schemes such as textual  passwords, graphical passwords, and various types of biometrics into a 3­D virtual  environment. The choice of what authentication schemes will be part of the user's 3D  password   reflects   the   user's   preferences   and   requirements.  ...

Words: 3177 - Pages: 13