Premium Essay

Cmgt 400 Week 3

In:

Submitted By warkaj
Words 1768
Pages 8
Securing and Protecting Information
CMGT 400
April 8, 2013

Securing and Protecting Information
Authentication
With the advances in technology, authentication has become part of our everyday lives, whether scanning your badge at work, signing for a credit card purchase, or logging into your Facebook/Twitter accounts. Authentication is the act of validating your identity while requesting access to software, purchases, or entry to a secured facility. There are four types of authentication; something you know, something you have, something you are, and something you can produce. When a service requests two or more types of authentication, it is called strong authentication, such as inserting an identification card and providing a password to access a computer workstation.
“Something you know” refers to the use of passwords, passphrases, and codes or PINs. When creating a password, the user must make the decision to create a string of alphanumeric and special characters with differing cases. The longer and more complicated a password the user creates drastically reduces the risk of cracking or brute force attacks. The same password must also be something easily remembered by the user to dissuade it from being written down and stored onsite or left at the workstation. A solution to this is creating a passphrase, a common phrase or date abbreviated and linked together with special characters to create a personal passphrase difficult to crack but easy to remember. An example of this would be a favorite television show with the day and time it airs. A common rule is to create a string at least eight character longs with at least one number and one special character, which this example adheres.
The “something you have” method requires the user to carry and use an access control item. A common one used with the military and federal government is a smart card

Similar Documents

Premium Essay

Get Online Help with Ur Assignment Ashford a+Material

...http://homeworktimes.com/downloads/acc-202-complete-course-acc-202-entire-course/ http://homeworktimes.com/downloads/acc-206-entire-course-new/ http://homeworktimes.com/downloads/acc-206-new-week-1-assignment-chapter-one-problems/ http://homeworktimes.com/downloads/acc-206-new-week-2-assignment-chapter-two-three-problems/ http://homeworktimes.com/downloads/acc-206-new-week-2-journal-institute-management-accounting/ http://homeworktimes.com/downloads/acc-206-new-week-3-assignment-chapter-four-five-problems/ http://homeworktimes.com/downloads/acc-206-new-week-3-journal-hershey-company/ http://homeworktimes.com/downloads/acc-206-new-week-4-assignment-chapter-six-seven-problems/ http://homeworktimes.com/downloads/acc-206-new-week-5-assignment-chapter-eight-problems/ http://homeworktimes.com/downloads/acc-206-new-week-5-assignment-final-paper/ http://homeworktimes.com/downloads/acc-212-financial-accounting/ http://homeworktimes.com/downloads/acc-250-complete-course-acc-205-entire-course/ http://homeworktimes.com/downloads/acc-290-complete-course-acc-290-entire-course/ http://homeworktimes.com/downloads/acc-291-complete-course-acc-290-entire-course/ http://homeworktimes.com/downloads/acc-340-entire-course-acc-340-complete-course/ http://homeworktimes.com/downloads/acc-400-complete-course-acc-400-entire-course/ http://homeworktimes.com/downloads/acc-407-entire-course/ http://homeworktimes.com/downloads/acc-455-complete-course/ http://homeworktimes.com/downloads/acc-492-complete-course-acc-492-entire-course/ ...

Words: 3197 - Pages: 13

Premium Essay

Cmgt 400 Week 4 Dqs

...This archive file of CMGT 400 Week 4 Discussion Questions comprises: DQ 1: Post a 150-200-word response to the following discussion question by clicking on Reply. What are the top three areas that an organization should work on to respond to the issues raised in the de Villiers (2010) article? Why are these areas critical to the organization? Is the author Deadline: ( ), Computer Science - General Computer Science Group Project: MiniQuest Database Objective | Overview | Case Project Overview | Needed Reports | Sample Data | Some Known Assumptions | What Your Team will be Required to Do | Task 1 (Due at the end of Week 3) | Task 2 (Due at the end of Week 4) | Task 3 (Due at the end of Week 5) | Task 4 (Due at the end of Week 6) | Task 5 (Due at the end of Week 7) | Submission of Tasks | Team Member Responsibilities | Assessment | Grading Rubrics Objective The project for CIS336 is designed to touch all aspects of the fundamental concepts of database design and logical data modeling covered during the class. The project is team centered and each team will be responsible for designing, developing, and demonstrating the functionality of a database created based on a defined set of business specifications. At the end of the session, each project team will submit the database designed by the team and demonstrate the database's ability to deliver the required information as outlined in the project specifications....

Words: 359 - Pages: 2

Premium Essay

Com 285 Cross Cultural Communication

...This pack of CMGT 400 Week 5 Discussion Questions shows the solutions to the following problems: DQ 1: Post a 150-200-word response to the following discussion question by clicking on Reply. What is the role of an internal IT audit group in an organization? Why is having such a group important for an organization and why should it report outside the normal IT reporting channels? DQ 2: Post a 150-200-word response to the following discussion question by clicking on Reply. What are at least three questions that you would ask to perform basic threat modeling for a field other than health care? Base your response on the information found in the AHC Media article (2009). Discuss your reasons for picking the questions you use. Deadline: ( ), Computer Science - General Computer Science Group Project: MiniQuest Database Objective | Overview | Case Project Overview | Needed Reports | Sample Data | Some Known Assumptions | What Your Team will be Required to Do | Task 1 (Due at the end of Week 3) | Task 2 (Due at the end of Week 4) | Task 3 (Due at the end of Week 5) | Task 4 (Due at the end of Week 6) | Task 5 (Due at the end of Week 7) | Submission of Tasks | Team Member Responsibilities | Assessment | Grading Rubrics Objective The project for CIS336 is designed to touch all aspects of the fundamental concepts of database design and logical data modeling covered during the class. The project is team centered and...

Words: 368 - Pages: 2

Free Essay

Cmgt 400 Week 1 Dqs

...This file of CMGT 400 Week 1 DQs shows the solutions to the following problems: DQ 1: Post a 150-200-word response to the following discussion question by clicking on Reply. What is the mindset required to properly protect information? What role does reasoned paranoia play in the minded and how can an individual keep the proper balance between protecting information and enabling business? DQ 2: Post a 150-200-word response to the following discussion question by clicking on Reply. How can information be an asset in a company? Discuss three different examples of information that should be protected by a company and not exposed. Include several examples of what management could do to protect each example. Deadline: ( ), Computer Science - General Computer Science Group Project: MiniQuest Database Objective | Overview | Case Project Overview | Needed Reports | Sample Data | Some Known Assumptions | What Your Team will be Required to Do | Task 1 (Due at the end of Week 3) | Task 2 (Due at the end of Week 4) | Task 3 (Due at the end of Week 5) | Task 4 (Due at the end of Week 6) | Task 5 (Due at the end of Week 7) | Submission of Tasks | Team Member Responsibilities | Assessment | Grading Rubrics Objective The project for CIS336 is designed to touch all aspects of the fundamental concepts of database design and logical data modeling covered during the class. The project is team centered and each team will be...

Words: 360 - Pages: 2

Premium Essay

Project Controls

...Week Four Team Charter, Project Plan, & Costing Learning Team D Barbara Fulton, Israel Salinas, Jessica Thomas, Jesse Moody, Solomon Kebede CMGT/410 September 30, 2013 Kara McFall, EdD, PMP General Information |Project Title: |Racing games for Smartphone’s | |Brief Project |Video game production company that makes video games for the popular consoles and now wants to make a version of | |Description: |one of their racing games for Smartphone’s hosting the android operating system. | |Prepared By: |Team “D” | |Date: |9/30/2013 |Version: |Three | Background Information VG Production Company is a company that specializes in video games for popular gaming consoles. Founded in 1994, VG has been one of the most successful video game production companies in the United States. Recently, the demand in video game applications for smart phones on the Android market has been growing exponentially. As a result, VG Production Company has decided to extend its video games from consoles to smart phones, starting with its most popular racing game, Extreme Burner’s. Goals and Objectives The goal of...

Words: 2039 - Pages: 9

Premium Essay

Evolution of Erp

...Evolution of ERP Week 5 Individual Assignment University of Phoenix Online Mary A. Fuller CMGT 556 Dr. Manuel Torres September 9, 2012 The Evolution of Enterprise Resource Planning (ERP) was developed to distribute computerized automation to several different entities of an organization to assist with problems of handling raw materials, inventory, order/data entry, and distribution. Before the evolution of ERP it was not possible for many of the functions in the past such as sales, marketing, and shipping to be done. It was impossible to integrate ERP with the capabilities of CRM whereas organizations would be able to use customer specific information to tie into a web portal for order services between a customer and a business. Integration between ERP and CRM was impossible during its earlier development. The evolution of ERP has developed into a comprehensive software activity that has extended its reach to encompass warehouses, distribution, and order/data entry. During the evolution of ERP it was made possible to integrate with CRM and ERP can now be used for marketing, sales, and the sharing of information across a web portal. The integration of ERP and CRM has made it possible for organizations to function at a reliable rate of success while accommodating entire organizations. Explanation of Evolutionary Timeline of ERP 1960s - (ERP) is born from a joint effort between J.I. Case, the manufacturer of tractors and other construction machinery, and partner...

Words: 915 - Pages: 4

Premium Essay

Kudler Fine Foods

...CMGT/400 Final Project Kudler Fine Foods IT Security report This table is developed to help us identify the top threats with the new customer rewards program that we are putting into play. Kudler Fine Foods is getting a new and improved system that will help them keep track of the shoppers purchase activities. This table was developed by us in hopes of letting them know the vulnerabilities’ and threats that may arise while doing so. Also we have drafted a summary of the threats that we the team feel will be very influential to this process. This security report and presentation is what we have prepared in hopes of gathering this information that it will help them with their new system. Table of Threats Area of System | Threats | Potential Vulnerability | Loyalty Program | External and Internal Users | Loss of customer financial data, loss of customer privacy information. | System Network Access | Internet | Hackers can gain customer and business info. Loss of Revenue, Loss of customer data. | Employees (Kudler) | Information misplacement | Accidental loss of customer data, Loss of Revenue | Point of Sale System | Unauthorized user | Data breach, loss of customer information, company data loss. | | | |   |   |   | You have to also consider your technical security when starting any kind of project such as this frequent shopper program. You have firewall that is needed to help defend the server and stop a data breach. The user configuration that...

Words: 1511 - Pages: 7

Premium Essay

Securing and Protecting Information

...CMGT 400 Week 3 Securing and Protecting Information Security Authentication Process It is necessary to secure your authentication method to safeguard your system against varied forms of security threats, like brute-force or wordbook attacks, impersonation of users, and reply attacks. Additionally, if you share resources on your network with alternative organizations, you need to make sure that your authentication policies are interchangeable with the organization in which you are exchanging your information with. Authentication is the method in which a person must prove that they are who they say they are. Public and private networks, utilize authorized logins and passwords. Data is ran through the password database to ensure that the user is someone that has the credentials to access the network. In order to allow access a company’s intranet, they must register or be registered with the appropriate credentials to access this network. For this reason, net business and plenty of alternative transactions need additional authentication methods. “The utilization of digital certificates issued and verified by a Certificate Authority (CA) as a part of a public key infrastructure is taken into account probably to become the quality thanks to perform authentication on the web” (D'Arcy, Hovav, & Galletta, 2009). Process includes: Create a strong password policy Establish an account lock out policy Assign logon hours Create a ticket expiration policy Establish network authentication...

Words: 1442 - Pages: 6

Premium Essay

Project Management

...Project Management Project CMGT/410 Kudler Fine Food Implementation Project Introduction Kudler Fine Foods is a privately owned California-based gourmet food store founded in 1998 by Kathy Kudler. Kudler Fine Foods has three stores in La Jolla, Del Mar, and El Encinitas, California. KFF offers high-end products and markets them in upscale neighborhoods. KFF has expressed an interest in the development of an Enterprise Resource Planning (ERP) system to improve business administration and integrate stores and business systems. The desired results from a successful implementation of the ERP: devising more informed decision-making strategies, streamlining sales and business processes across the three stores and integration all functional business systems for effective business management. This document serves as a project plan to define necessary information and detail for the development and implementation of the Kudler Fine Foods ERP system in reference to Service Request SR-kf-004. Background and Statement of Need Kudler Fine Foods is a specialty food store that currently has three locations in the San Diego metropolitan area. The stores stock specialty foods that are both domestic and imported and are also perishable. The owner is in the process of opening two additional stores as well as developing a website that consumers would be able to make purchases and the stores would be able to track inventory and stock as well. In addition...

Words: 7534 - Pages: 31

Premium Essay

Kudler Fine Foods Frequent Shopper Program

...Kudler Fine Foods Frequent Shopper Program Brian Musha, Darrell Jones, David Kress, Matthew DiMare, Jason Longo, Thomas Kunis CMGT/400 February 9, 2015 Robert Quintin Introduction Team C has been tasked to develop a Customer Loyalty Program for frequent shoppers at Kudler Fine Foods. The program will consist of loyalty points that may be used by the frequent shoppers to purchase high value merchandise from the vendors of the loyalty points partner program. The team has also been tasked to insure that the information collected from the frequent shoppers is securely protected from outsiders and others that may make the system vulnerable to threats. Team C will cover each step within the system development life cycle to cover all systems affected and mitigation of risks and will at properly satisfy the needs of Kudler. Outline of Customer Loyalty Program Kudler Fine Foods prides itself on delivering the finest in specialty foods from around the world. In continuing with the tradition of providing the best for their customers Kudler has decided to develop a Customer Loyalty Program. This program will consist of a loyalty points program with said point being accrued from purchases made from Kudler. The customer will have to sign up for the program and after doing so will have their purchases tracked and with each purchase will collect loyalty points that can later be used towards high value items provided by vendors of a loyalty points partner program. The reasoning...

Words: 4127 - Pages: 17