Computer Security Essay - Part 4
Many commercial software packages are designed with computer security features that control who can access the computer - Computer Security Essay introduction. These types of access controls use a process called identification and authentication. Identification verifies that the user is a valid user, and authentication verifies that the user is who he or she claims to be. Three common methods of authentication are remembered information, possessed objects, and biometric devices. With remembered information, a user is required to enter a word or series of characters that match an entry in a security file in the computer.
Most multiuser operating systems provide for a logon code, a user ID, and a password (all forms of remembered information) that all must be entered correctly before a user is allowed to use an application program. A logon code usually identifies the application, and a user ID identifies the user. “A password usually if confidential, often known only by the user and the system administrator. ” (Baker, 29-47). A possessed object is any item that a user must carry to gain access to the computer facility. Examples of possessed objects are badges, cards, and keys.
More Essay Examples on Authentication Rubric
Possessed objects often are used in conjunction with a personal identification number (PIN), “which is a numeric password. ” (Prince, 15-18). A biometric device is one that verifies personal characteristics to authenticate a user. Examples of personal characteristics are fingerprints, voice pattern, signature, hand size, and retinal (eye) patterns. “A biometric device usually translates a user’s personal characteristics into a digital code that is compared to a digital code stored in the computer” (Victors, 7).
If the digital code in the computer does not match the user’s code, access is denied. Each of these authentication techniques has advantages and disadvantages. Many organizations distribute brochures and newsletters to promote their biometric devices. In the past, preparing these devices was extremely complicated and expensive. Due to modern technology; however, biometric devices have become very affordable (Baker, 29-47). A computer system should implement one or more of these authentication techniques to secure it from accidental or intentional misuse. In addition, the organization should review the techniques in place regularly to determine if they are still appropriate.
Baker, Jamie D. and Cynthia I Danville. “Security, Ethics and Privacy”. Computers and Society Journal, Feb. 1998: pp. 29-47. Price, Karen E. , “Identification and Authentication Controls”. pp. 15-18. Victors, Michael R. , The Computer Auditor. St. Louis: Green Valley Publishing Company, 1998. pp. 7. Baker pp. 7