Professional Documents
Culture Documents
BS InfoTech 2-A
UNIT 4
Information Systems Security
Assess your Knowledge :
1. Describe one method of multi-factor authentication that you have
experienced and discuss the pros and cons of using multi-factor
authentication.
Cloud Services (Google)- Goodle also offer two-factor authentication
for users with a google account. Since many people use their google
accounts for more than one purpose, thislevel of protection is
essential. For everday users, Google employs a knowledge factor
followed by a possession factor. So first, the user enters their
password and then they type in one-time SMS code.
Pros of Multi-factor Authentication
Makes your account secure
Easy to use
Creates another roadblock
Cons
Smart phones and physical tokens can be stolen
Must carry a mobile phone
3. Find favorable and unfavorable articles about both blockchain and bitcoin.
Report your findings, then state your own opinion about these technologies.
-The author Henry Miller once said, “Confusion is a word we have invented for an
order which is not understood.” And confusion seems to run rampant in many
articles that are critical of blockchain, while the real problem is with Bitcoin and
cryptocurrencies.There are key differences between Bitcoin and blockchain.
Blockchain is a digitized, distributed and secure ledger that guarantees immutable
transactions and solves the trust problem when two parties exchange value.
Cryptocurrencies like Bitcoin rely on blockchain to conduct transactions. Yet
blockchain transcends cryptocurrencies and offers many solutions that are likely to
disrupt numerous industries with some profound implications. In a simple
metaphoric comparison, blockchain is like an engine that can be used in airplanes,
vehicles, elevators, escalators, washers and dryers. Bitcoin, meanwhile, is like the
first Ford Model T car that was manufactured in 1908. This fundamental difference
helps in understanding the polymorphic value of blockchain and the problems with
bitcoin and most cryptocurrencies.
For me my opinion would be -understanding removes confusion, and
understanding the difference between Bitcoin (the car) and blockchain (the engine)
will shed some light on the real problems and the likely future of Bitcoin,
cryptocurrencies and blockchain.
Confidentiality
It's crucial in today's world for people to protect their sensitive, private information from
unauthorized access.
Protecting confidentiality is dependent on being able to define and enforce certain access
levels for information. In some cases, doing this involves separating information into various
collections that are organized by who needs access to the information and how sensitive
that information actually is - i.e. the amount of damage suffered if the confidentiality was
breached.
Some of the most common means used to manage confidentiality include access control
lists, volume and file encryption, and Unix file permissions.
Integrity
Data integrity is what the "I" in CIA Triad stands for. This is an essential component of the
CIA Triad and designed to protect data from deletion or modification from any
unauthorized party, and it ensures that when an authorized person makes a change that
should not have been made the damage can be reversed.
Availability
This is the final component of the CIA Triad and refers to the actual availability of your data.
Authentication mechanisms, access channels and systems all have to work properly for the
information they protect and ensure it's available when it is needed.
High availability systems are the computing resources that have architectures that are
specifically designed to improve availability. Based on the specific HA system design, this
may target hardware failures, upgrades or power outages to help improve availability, or it
may manage several network connections to route around various network outages.
7. What is pretexting?
occurs when an attacker calls a helpdesk or security administrator and
pretends to be a particular authorized user having trouble logging in.
9. What is a firewall?
Firewalls are another method that an organization can use for increasing
security on its network.
10. What does the term physical security mean?
is the protection of the actual hardware and networking components that
store and transmit information resources.