Wednesday, May 8, 2019
Answer some questions Assignment Example | Topics and Well Written Essays - 500 words
Answer some questions - Assignment ExampleAs a result, authentication, access control and auditing work together to establish network defense through the impediment procedures, assigning roles to users and installing control mechanisms that curb errors and frauds.A breach of the CIA triad for a campus police subdivision at a mid-sized private university will allow access of confidential information to third parties. This bum lead to loss of data through modification, alteration and disclosure, leading to harmful risks to students and the institutions database. As a result, hackers endure obtain personal information of students and use them for illegal activities like cyber bullying, leaking of examination or tampering with the management information systems.Another breach is that criminals or hackers can access the police methods of tackling curse and use them to evade arrests. This is because crude systems of operations are normally taught in the campus police departments.Howe ver, the potential problems of this new authentication system are that it can be stolen or lost easily, the system supplier can face hacking or the cryptography can be cracked. This implies that the loss of the token can permit an veritable person to access the database. It is also apparent that hacking of the token can affect their security purposes, especially if the provider has not installed tight measures.OSI model portrays and standardizes the internal operations of a conference system. This occurs through the partitioning of the communication system into concealed details of the functionalities. The OSI model is essential for network security because it simplifies the communication between computers through internet connectivity in a secure manner (Ciampa 125).The various network investigation tools available online includes L0phcrack, res publica Dossier, John the Ripper and Dictionary attack. L0phcrack is a password recovery system that strengthens
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.