StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

CIS212 U1 Discussion - Essay Example

Cite this document
Summary
It is inclusive of how the security controls are. It has to be in a manner that advances the security and integrity of the data in the…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.1% of users find it useful
CIS212 U1 Discussion
Read Text Preview

Extract of sample "CIS212 U1 Discussion"

Security Management Process Insert Insert Security management entails ensuring that the integrity, confidence and consistency in theavailability of services and data in an organization. It is inclusive of how the security controls are. It has to be in a manner that advances the security and integrity of the data in the organization. It also ensures that users are not services that should be available at all times. Testing will ensure a smooth operation and prevent attacks that take advantage of obsolete concepts.

Further, management of intrusions is crucial (Poulsen & LaPage, 2011). The mission is to identify and counter attacks. These should level to a situation that is accommodating to the organization at least. The preceding is with reviewing of the security mechanisms to ascertain and ensure that frequent testing is done on them and maintained as well.There are various common means of authentication. The notion is to get the victim known to be what they allude to be. Essentially there is user authentication and entity authentication.

As a result, we have form authentication that entails passing in a username and password on web pages to gain access. Cookies are authentication mechanisms as a means to achieve entity authentication. It accomplishes this through the use of sessions. Authentication at the infrastructure will involve the use of DNS names. They are applicable where applications need to allow access to other hosts. In addition, there is spoofing of IP addresses. To make it more viable, integrate with the use of SSL.

Using authentication mechanisms that use usernames and passwords is all time favorite. Despite the method being familiar and readily available, it is also weak and easier to penetrate (Ciampa, 2012). Due to its user-friendliness, if precautions are into account like the inclusion of symbols and letters within the text then it is the cheapest.A number of issues psyche hackers. First is the fun and satisfaction they attain by hacking. Secondly, they do so to gain some finances. By getting information to third parties, they are paid highly for their services thus it is a means of livelihood to some.

They use means like phishing, brute-force attack, dictionary attack, and SQL injection for site hacking. Further cross-site scripting is also applicable. They accomplish this through establishing a plan of execution. Foot printing deals with comprehension of the system they wish to hack just the way a physical gang will prepare to attack a bank.ReferencesCiampa, M. (2012). Security+ guide to network security fundamentals. Boston, MA: Course Technology, Cengage Learning.Poulsen, T., & LaPage, A. (2011). CompTIA security+ certification.

[Fairport, NY]: Axzo Press.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“CIS212 U1 Discussion Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
CIS212 U1 Discussion Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1687615-cis212-u1-discussion
(CIS212 U1 Discussion Essay Example | Topics and Well Written Essays - 250 Words)
CIS212 U1 Discussion Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1687615-cis212-u1-discussion.
“CIS212 U1 Discussion Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1687615-cis212-u1-discussion.
  • Cited: 0 times

CHECK THESE SAMPLES OF CIS212 U1 Discussion

Business Organisations and the Law

Essentially, a company is a type of business organisation whose accurate designation and description diverge depending on its geographical jurisdiction.... In an American business environment, a company is a corporation, or less commonly, an association, partnership, or union which carries on an industrial endeavor....
11 Pages (2750 words) Essay

Analyses of characteristics of bread made from chestnut flour using standard method

Gluten has several negative health impacts.... A healthier option is consumption of bread made from gluten-free chestnut flour which also adds… The project evaluated breads made from chestnut flour and combinations of chestnut flour with other flours on several grounds.... Several tests were designed and the results were evaluated....
5 Pages (1250 words) Assignment

Comparing Windows With Linux

It also concerns the ability of the filesystem to be increased or reduced and limitations that come with it (Basta, 2013).... We also consider its compatibility with a majority of the other… It is also vital to consider the length of its fsck which determines whether it's or not journalized. I use exFAT filesystem because it saves me the time of having to format the drive when shifting from the two operating systems I use i....
1 Pages (250 words) Coursework

CIS204 U4 Discussion

These areas might be spread out across wide geographical locations.... WANs can also be used to create connections between smaller networks such as LANs and MANs (Edraw 2015).... For the… The most recommended technology would be the Virtual Private Network, since it fits the organizational needs and the budget as well. VPNs are Establishing a Wide Area Network (WAN) for a Resort al Affiliation Establishing a Wide Area Network (WAN) for a Resort IntroductionWide Area Networks (WAN) are computer networks used to develop connections between several areas....
1 Pages (250 words) Coursework

Nuclear Plant Password Policy

A threat is anything that poses the danger to the computer system whereas vulnerability refers to a loophole or a weakness that hackers or attackers can use to attack a system.... Atheotherhandlikelihoodloss There are situations where a risk is said to be vulnerability but in other… 3) A biometric handprint scanner is as part of a system for granting access to a facility....
4 Pages (1000 words) Essay

CIS212 U3 Discussion

Access control tools are concerned with determining the allowed activities of legitimate users, mediating between every attempt by a user to access a particular resource in the system.... Its main objective is to make sure that undesired users do not get access to certain… Role-based access control and Discretionary Access Control both are based on defining the roles and adding each user to the system....
1 Pages (250 words) Essay

CIS126 U1 Discussion 2 - 1

The evolving nature of Object Technology has caused many companies to reexamine their legacy codes to ensure that it matches it.... The… In the recent years, some languages like C++ and Java have considerably advanced in the use of Object Technology. Despite the many benefits that object technology poses, its The Dark Side of Object Technology Insert Insert Object technology became prevalent in industrial languages as from 80's but became established in other languages like Java and UML in the 90s....
1 Pages (250 words) Essay

CIS256 U3 Discussion

These names represent the names of particular hosts.... When the domain name is said to be fully qualified, it means that the hostname is a… For instance, gendersoft.... omain.... om. I would prefer Microsoft domain name service as compared to BIND DNS.... The reasons for this include the centrality of access to the role as a part of the Windows server package (Minasi, 2014)....
1 Pages (250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us