Essays on Basic Defense Methods in Information Systems Coursework

Download full paperFile format: .doc, available for editing

The paper “ Basic Defense Methods in Information Systems” is a timeous example of a finance & accounting coursework. Individuals and businesses are becoming more reliant on the trustworthy functioning of their information systems. These systems are instrumental towards their achievement and effectiveness. While this increasing reliance on information management systems produces a pressing requirement to accumulate data and make it more available, the abundance of computer technology has also brought forth prospects for malicious persons to contravene the integrity and legitimacy of these systems. One of the frequent control mechanisms for authentication and validation of users of these systems is the utilization of passwords.

Nonetheless, in spite of the extensive application of passwords, Minimal awareness and interest have been given to the distinctive nature of their real use. This paper will analyze two network security tools i. e. (Instant password finder and proactive checker). The analysis will also look into their features and a discussion on the criteria employed in selecting the two will also be highlighted. The paper will also address the gap in tool evaluation together with the characteristics. The results will be produced in the form of a practical study.

The paper will conclude with a discussion on the relative weakness and strengths of the two tools. IntroductionOne of the most basic defense methods in any information system is the capability of system administrators to validate the identity of users. Although studies on how to boost security are being conducted including investigations on complex methods of authentication, the Application of password methods continues to be the main technique of validating Information system users. (George, 2001). From physical to online networks, information systems depend on admission validation through passwords (George, 2001).

Despite both reported and unreported security breaches in computer networks, Validation and authentication of individuals using networks continue to trouble network and information security experts.   Proactive Password checker and Instant Password Finder (network security)

References

George D. (2001). Information security: 4th international conference. London: Diane publishers.

Jacob A. (2007). User Authentication Principles: Theory and Practice. Cambridge: Cambridge University Press.

Klein D. (1999). A survey of improvements to UNIX password security: Proceedings of the USENIX security workshop. Oxford: OxfordUniversity Press.

Matt B.(1990).A proactive checker. New York: Diane Publishers.

Download full paperFile format: .doc, available for editing
Contact Us