Even if IT is giving a lot for the business world, it has also posed a very serious IS security threat.
a. List at least three factors or computer crimes contributing to information security threats. (3 marks)
b. Discuss three of the mechanisms that address information security challenges
The computer crimes contributing to information security threats are;
1) Phishing
2) Password attacks
3) Malware
The mechanisms that address information security challenges are;
a) Data encryption- this is the process that scrambles data to protect it from being read by anyone but the intended reciver. Encryption is a security feature that provide data confidentiality and can also be used to identify the sender of the data.
b) Authentication- this process helps in identifying who is requesting network services. It involves the authentication of devices, users and software processes. To maximize security, a dynamic password is used. A smart card with the users personal identification number ( pin) is used to provide a one-time password used to access the corporate network for a limited time. The password is synchronized with a central security card server that resides on the network.
c) Authorization- Whereas authentication controls who access network resources, authorization limits who have access to the network can do after they have accessed the resource. It grants privileges to processes and users. Authorization allows the security administrator to control parts of a network.
Comments
Leave a comment