StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

The Security of Access Management Systems - Dissertation Example

Cite this document
Summary
This dissertation "The Security of Access Management Systems" focuses on freedom from any sort of danger or fear. Security is one of the most important aspects of an access management system since the login credentials of the users need to be safeguarded with security measures. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.5% of users find it useful
The Security of Access Management Systems
Read Text Preview

Extract of sample "The Security of Access Management Systems"

Download file to see previous pages

The ownership-based factors of security are the details that are possessed by the owner himself. It is considered to be something that is physically given by the concerned authorities that will facilitate access to the desired system. However, the level of security for ownership-based factors is considered to be ‘low’ since the physical token can be stolen or misplaced. It includes physical objects that can be used by intruders to gain unauthorized access. A better approach is to use these factors as a part of the authentication process that authorizes the person for example the physical token might have to be used with the combination of a knowledge-based factor.

These are usually referred to as tokens. Three types of tokens have been explained by: The mobile device is also referred to as the USB token device. This device is very small as it is almost the size of a key. The size makes it accessible and reduces the need to remember any credentials. This aspect can save a company a significant amount of expense that would otherwise be spent in buying required software or hardware for the employees [5]. The USB device is recognized by the system and the second part of the authentication process commences i.e. the entry of the password.

These devices are very hard to duplicate and serve as secure mediums to store sensitive information like private keys, security certificates, etc. The following figure shows the image of a USB token device:It has to be inserted in any USB port of the system; this aspect increases its usability since no special software or hardware is required to avail this technology.This technique proves to be effective if it is accompanied by a knowledge-based factor.A smart card resembles a credit card and has a microprocessor embedded in it that stores and processes data.

The presence of the microprocessor makes the device intelligent enough to be handle complex authentication mechanisms. It is recognized by the system through a card reader.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Buliding a UbAMS Model from the Literary Review Dissertation”, n.d.)
Retrieved from https://studentshare.org/family-consumer-science/1405041-buliding-a-ubams-model-from-the-literary-review
(Buliding a UbAMS Model from the Literary Review Dissertation)
https://studentshare.org/family-consumer-science/1405041-buliding-a-ubams-model-from-the-literary-review.
“Buliding a UbAMS Model from the Literary Review Dissertation”, n.d. https://studentshare.org/family-consumer-science/1405041-buliding-a-ubams-model-from-the-literary-review.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Security of Access Management Systems

Access and Event Management

access management refers to authorization of humans and privileges to a system within or across enterprise boundaries.... access management deals with authorization and authentication procedures set up by an organization.... Security measures imposed on information systems restrict unauthorized external access.... The documentation provides a framework for easy restoration of systems when they fail.... The organization can also use them as evidence against unauthorized access to the systems....
10 Pages (2500 words) Essay

Vulnerability of an Organizations Information System

Hardware and Software: Information systems viruses and other malwares have the capability to destroy the software system of computers, or they might affect the security functions of the system.... This paper ''Vulnerability of an Organizations Information System''  focuses on the vulnerabilities those organizational information systems presently challenging the IT managers, with over viewing the most important cyber security vulnerability and considering measures that might protect organizations from such vulnerabilities....
10 Pages (2500 words) Research Paper

Computer Security and the Systems Vulnerabilities

It also provides recommendations for buttressing the security of the computer systems based on the identified threats and vulnerabilities.... The essay looks into the threats and vulnerabilities that the event exposed and examines the security principles that were broken.... Computer security is also regarded as a compromise; it is seen that the greater the security, the difficult it is for users to work with the system (Salomon 2006).... This paper looks into the threats and vulnerabilities that the event exposed and examines the security principles that were broken....
6 Pages (1500 words) Essay

The Significance of Systems Configuration and Management for a UNIX System

This essay analyses some fundamental issues that compromise the security and privacy of the UNIX system.... This essay "The Significance of systems Configuration and Management for a UNIX System" discusses detailed analysis of security-related aspects for the UNIX operating system.... hellip; Normally, all UNIX-based or other systems encompass particular log-on procedures.... Thus, to deal with such new types of security attacks a good security management patch as well as effective security strategy is very important, which can help secure an organization's systems and networks....
8 Pages (2000 words) Essay

Biometric Security System

The stripe on the back of the security pass card is a magnetic stripe, often called a magstripe.... hellip; Management has decided to use a Biometric-based smart card system with either Fingerprint or Vein Recognition systems.... Human characteristics used for biometric recognition systems are based on parameters like universality, uniqueness, permanence, collectability, performance, acceptability, and circumvention, Ofcom(2009).... This paper ''Biometric security System '' tells that Dynamic Air Parts plc has a large manufacturing complex within a square kilometer area....
11 Pages (2750 words) Essay

The System Administrators of MegaCorp: Security Goals

The paper "The System Administrators of MegaCorp: Security Goals" focuses on the security of network infrastructure.... Contextually, it can be affirmed that an operating system is usually viewed to be one of the major fundamental aspects concerning improving the security of every computing system by a considerable level.... With this concern, the primary purpose of this paper is to develop, document, and assess best practices for server deployment and administration that would eventually support and enhance the security of Megacorp towards upgrading its new operating system....
12 Pages (3000 words) Assignment

Developing Security Policy

It might include regulatory restrictions, security of highly significant data, or the appropriate utilization of certain technologies.... On the other hand, if there is an absence of a security policy guiding the decision makers, then decisions will be made on ad-hoc bases, by the individuals developing, installing, and maintaining computer systems, and this will result in a disparate and less than optimal security architecture being used or implemented (Weise & Martin, 2001)....
9 Pages (2250 words) Essay

The Benefits of Mail Server

These standards are independent of client and server platforms andoperating systems.... … The Internet Message access Protocol, Version 4 (IMAP4) and Post Office Protocol,Version 3 (POP3), are open Internet standards for retrieving mail from a server.... The Internet Message access Protocol, Version 4 (IMAP4) and Post Office Protocol,Version 3 (POP3), are open Internet standards for retrieving mail from a server.... Domains A domain is a logical grouping of directory information, suchas users, with centralized administrative access through aconfiguration node....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us