Sunday, June 16, 2019

Pervasive Computing in Security Essay Example | Topics and Well Written Essays - 1750 words

Pervasive Computing in gage - Essay ExampleAuthentication is the process of proving that you are who you say you are and establishing demonstration of identity. Authentication can be achieved through the use of discussions, smart cards, biometrics, or a combination thereof.People are the next most important auspices component. Often, people are the weakest link in any security infrastructure. Most corporate security relies on the password a user chooses. If the user chooses his or her first name as the password, the time, energy, and money spent evaluating, purchasing, and implementing security solutions go out the window. Numerous methods exist to gain feeler to a system. Social plan preying on the weakest factor in any security infrastructure, the human-is one of the most successful methods. From pretending to be a helpdesk worker and asking users to vary their passwords, to dressing up as the copy machine repair technician to gain natural access to a building, social engin eering is effective in gaining access to an organizations systems. (Andress, 2003)Other methods include trying to guess username and password combinations and using exploits in operating systems and applications to gain access to systems. Some common exploits include buffer overflows, Windows exploits, and clear server application exploits. The most popular tool for information theft attacks is the network sniffer. With a sniffer, an attacker monitors traffic on a network, usually flavor for username-password combinations. (Andres, 2003) The use of sniffers is known as a passive attack because the sniffers snooping does not require any action on the part of the attacker. Active attacks, on the new(prenominal) hand, do require action. Examples of active attacks are dumpster diving or calling up an individual at a target company and asking for information. Security AwarenessSecurity awareness can be provided at the utmost by conducting seminars and awareness campaigns. Such campaig ns work well in explaining topics like password selection, screen locking, document labeling, and physical (door) security. Posters, e-mails, screensavers, and mouse pads printed with security tips and expectations help provide day-to-day reminders. Some companies even establish security incentive programs for their employees. Multifactor AuthenticationThe three major types of authentication which are commonly used now a days areSomething you know-personal identification number (PIN), password.Something you have-SecurID, smart card, iButton.Something you are-that is, some measurable physical characteristic of you, such as fingerprints

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.