StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Identification & Authentication in your organization - Essay Example

Cite this document
Summary
These limitations can be exploited by hackers and used as a entry point into the system in question (Ilgun, Kemmer and Porras, 1995; Skoudis, 2002). Conceding to the…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.7% of users find it useful
Identification & Authentication in your organization
Read Text Preview

Extract of sample "Identification & Authentication in your organization"

Download file to see previous pages

m of anomaly detection systems, have been identified by ICT professionals and scholars as extremely robust and potentially valuable because of their capacity to identify previously unknown intrusions or attacks. Even though the research literature is largely supportive of the implementation of honeypots as a supportive, rather than stand-alone, security system, our ICT director asserted that decisions should be based on a cost-benefit analysis. This is precisely what this paper will seek to do.

Following a definition of honeypots, their advantages and disadvantages will be discussed in relation to our company’s needs to determine the efficacy of their implementation. Honeypots are new security technologies that, while not a replacement for traditional intrusion detection systems, address some of the weaknesses of intrusion detection systems (Spitzner, 2003). As their only purpose is to be attacked, all traffic to the honeypot can be considered an intrusion or an anomaly of some sort.

For this reason there is no need to separate normal traffic from anomalous; this makes any data collected from a honeypot of high value. Added to that, since honeypots have no production value, no resource or person should be communicating with them, and therefore any activity arriving at a honeypot is likely to be a probe, scan, or attack. Their value comes from their potential ability to capture scans, probes, attacks, and other malicious activity (Spitzner, 2003). Determining whether or not honeypots should be implemented in our company is dependant upon an assessment of our company’s needs.

According to our ICT director, among the most important of the network security challenges we confront are the prevalence of internet worms, protection against unknown security holes and related viruses and the deciphering of security data logs for determination of the source of an attack, or attempted hack. A review of the functions of honeypots indicates that they address our

...Download file to see next pages Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Identification & Authentication in your organization Essay”, n.d.)
Identification & Authentication in your organization Essay. Retrieved from https://studentshare.org/miscellaneous/1541245-identification-authentication-in-your-organization
(Identification & Authentication in Your Organization Essay)
Identification & Authentication in Your Organization Essay. https://studentshare.org/miscellaneous/1541245-identification-authentication-in-your-organization.
“Identification & Authentication in Your Organization Essay”, n.d. https://studentshare.org/miscellaneous/1541245-identification-authentication-in-your-organization.
  • Cited: 0 times

CHECK THESE SAMPLES OF Identification & Authentication in your organization

Authentication of the Modern Generation

say in an organization stores its user database in an LDAP database.... The research in Universal authentication will definitely result in improving the betterment of an individual's assets to this secure e-world.... hellip; In a homogeneous IT infrastructure or at least where a single user entity authentication scheme exists or where the user database is centralized, single sign-on is a visible benefit.... All users in this infrastructure would have one or single authentication credentials....
7 Pages (1750 words) Term Paper

What Is Electronic Authentication

Whereas, authentication in computer science as Schellekens (2004, pg.... 60)… In all such instances, one is supposed too furnish a requisite identity to the concerned authorities that would establish our eligibility authentication procedures in the modern day rely extensively on electronic methods.... A single sign-on solution allows end-users a secured authentication for access and usage of desktops, enterprise applications, electronic communications, administrative and operational tasks (“SECUDE IT Security,” 2008)....
12 Pages (3000 words) Essay

Enterprise Info Security

How can the ability to distinguish between programs and data help to construct a defense against buffer overrun/overflow attacks?... hellip; They are thus the basis of many software vulnerabilities and can be maliciously exploited Understanding the difference between data and Buffer overflow/overrun is a form of interference where a program overruns the buffer's boundary and overwrites adjacent memory, while writing data to a buffer....
8 Pages (2000 words) Essay

Final project

A certificate is an electronic archive used to recognize an individual, a server, an organization, or some other element and to partner that character with a public key.... authentication permits the beneficiary of data to focus its cause that is, to affirm the senders personality.... An authentication gives for the most part perceived evidence of a mans character.... authentication is the procedure of affirming a personality....
4 Pages (1000 words) Research Paper

Biometrics Authentication in E-exams

The paper “Biometrics authentication in E-exams” analyzes E-learning as a great opportunity for the modern man.... authentication of e-exam takers is of prime importance so that exams are given by fair means.... It needs to be coupled with efficient and reliable security mechanisms....
8 Pages (2000 words) Assignment

The Use of Biometrics and Bio-Information to Support New Systems Integration

The research has shown that biometric systems provide a generally secure and suitable authentication mechanism.... Existing techniques to ensure security and human identification which is based on deriving credentials through PIN and identification credentials are not capable to deal with the increasing requirements for strict security measures in the implementation of border crossings, national ID cards, access control and government profits....
20 Pages (5000 words) Research Paper

Biometric Authentication

This assignment "Biometric authentication" presents leading-edge approaches to role-based authentication.... These features are unique to individuals and readily available; hence, making them ideal for the development of dependable authentication systems.... Since it would be hard to develop systems that cater to individual staff, DoD can come up with an authentication system based on the roles people play.... The use of human features, biometrics comes in handy in the identification of individuals while keeping their privacy intact....
6 Pages (1500 words) Assignment

Issues and Challenges That Information and Communications Technology Professionals Face

Information and Communications Technology (ICT) has today taken over as an essential and important factor to consider in every organization.... This report is a collective effort of a team of students that combined the topics of challenges facing ICT professionals, that is cloud computing, cybercrime, authentication, and bring-your-own-device (BYOD)....
10 Pages (2500 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us