Essentials of MIS (13th Edition)
Essentials of MIS (13th Edition)
13th Edition
ISBN: 9780134802756
Author: Kenneth C. Laudon, Jane Laudon
Publisher: PEARSON
Question
Book Icon
Chapter 8, Problem 1IQ
Program Plan Intro

System vulnerability:

  • When huge data amounts are been kept in electronic form, it becomes susceptible to many threats.
  • The information systems in many locations are been interconnected through communication networks.
  • The unauthorized access can occur at many access points in network and is not limited to single location.
  • The data flowing over networks could be accessed; valuable information could be stolen while transmission or data could be altered without authorization.
  • The denial-of-service attacks are launched by intruders to disrupt website operations.
  • Internets are vulnerable than internal networks as it is open to everyone.

Expert Solution & Answer
Check Mark

Explanation of Solution

Authentication and Identity management:

  • The Identity management (ID management) denotes an organizational process to identify, authenticate and authorize individuals to have access to information.
  • The information includes applications, networks with user rights and other company information.
  • It includes authenticating of users and to determine whether they are allowed access to particular system.
  • It determines whether a user has access to systems but also sets access level and permission level for users.
  • It includes control over process of authorizing system or network permissions for existing users.
  • It includes off boarding of users who are no longer authorized for access to organization system.
  • Authentication denotes a process of recognizing identity of a user.
  • It denotes a method to associate an inbound request with identifying credential set.
  • The credentials delivered are compared with values of file in a database of authorized information of user within authentication server.
  • It has two different phases, identification as well as actual authentication.
  • The identification phase would provide a user identity to security system.
  • This identity is been provided in form of a user ID.

Working with IT security systems:

  • Yes, have worked with IT security systems and identity management.
  • The job nature was to ensure proper working of systems in an organization.

Nature of work with software:

  • The job nature was to ensure proper working of systems in an organization.
  • The proper updating of virus protection software and system updates was a responsibility.
  • The scheduled back up schemes is to be controlled and managed.
  • To ensure proper working of software present in organization.
  • To ensure credentials provided by user matches with that of access file database.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
Please describe the idea of a challenge-and-response authentication system in your own words (CRAS). Why is this authentication method more secure than others that use passwords?
Understand challenge-response authentication. How is it safer than a password system?
Please explain what a challenge-response authentication system is in your own words, if you can. In what ways is it more secure than a password-based system?
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,