Security Authentication Process
Essay by shorthands04 • September 6, 2013 • Essay • 1,107 Words (5 Pages) • 1,178 Views
Security Authentication Process
I start out this paper by looking into the authentication process for security software and hardware. Basically in any form whether it be a software authentication to a hardware authentication the item essentially asks "who are you" then you have to input by biometrics or by typing in a username and password that you are and that you have the proper credentials to be accessing the said system. The process is the same as if you were using your wireless keychain remote to unlock your car, you tell the car who you are by the signal that they remote transmits and if that signal produces the right code then your car will unlock the doors so you may enter. In some newer cars the key FOB also tells the car that you can start it and drive. Thereby allowing the engine to start and for you to be able to engage the transmission and allowing you to drive away. That example was much the same as PC's and computer operated machinery that have security procedures in place to keep unwanted individuals from being able to access the system or equipment.
The development of new hardware and software's are currently adding more and more security to their products. Some companies offer different levels of protection for their hardware, and the software has had to undergo many types of security changes in order to keep hackers from supplying hacked versions of the software to everyone on the internet. There will always be someone who tries to hack or crack the coding in any and all types of software so that they can either give it away or infect it with all kinds of viruses. When a business decides to implement new hardware and software they will need to upgrade their security procedures as well.
The new system will be designed according to the company's specifications including the security of the system. In most cases the company will want their system as secure as possible and in doing so sometimes you may be limited in which types of hardware you would be able to use. In the banking and finance industry I have noticed that about 90% of the company's laptop's are made by Lenovo, they choose these because they are able to lock the laptop from being able to even startup without the use of a password, then once it has booted to the OS there is another password in the form of a alphanumeric or a biometric password, and then before you can log into the company's servers they have a personal password and a rolling password from a RSA id token. These are a few of the types of security procedures implemented by large-scale corporations.
Here are a few ways to secure data that may or may not be on a server. The first way is to have a backup done, this includes either onsite backups or offsite backups including but not limited to cloud servers. Another way of securing data is to use system wide encryption software to where all data on all hard drives are encrypted. The next way of securing the data is by using a redundant storage device; this could be a thumb drive, external hard drive, or even DVD backups. These are several
...
...