Computer Security Essay - Part 4

Many commercial software packages are designed with computer security features that control who can access the computer - Computer Security Essay introduction. These types of access controls use a process called identification and authentication. Identification verifies that the user is a valid user, and authentication verifies that the user is who he or she claims to be. Three common methods of authentication are remembered information, possessed objects, and biometric devices. With remembered information, a user is required to enter a word or series of characters that match an entry in a security file in the computer.

Most multiuser operating systems provide for a logon code, a user ID, and a password (all forms of remembered information) that all must be entered correctly before a user is allowed to use an application program. A logon code usually identifies the application, and a user ID identifies the user. “A password usually if confidential, often known only by the user and the system administrator. ” (Baker, 29-47). A possessed object is any item that a user must carry to gain access to the computer facility. Examples of possessed objects are badges, cards, and keys.

We will write a custom essay sample on
Computer Security
specifically for you for only $13.9/page
Order now

More Essay Examples on Authentication Rubric

Possessed objects often are used in conjunction with a personal identification number (PIN), “which is a numeric password. ” (Prince, 15-18). A biometric device is one that verifies personal characteristics to authenticate a user. Examples of personal characteristics are fingerprints, voice pattern, signature, hand size, and retinal (eye) patterns. “A biometric device usually translates a user’s personal characteristics into a digital code that is compared to a digital code stored in the computer” (Victors, 7).

If the digital code in the computer does not match the user’s code, access is denied. Each of these authentication techniques has advantages and disadvantages. Many organizations distribute brochures and newsletters to promote their biometric devices. In the past, preparing these devices was extremely complicated and expensive. Due to modern technology; however, biometric devices have become very affordable (Baker, 29-47). A computer system should implement one or more of these authentication techniques to secure it from accidental or intentional misuse. In addition, the organization should review the techniques in place regularly to determine if they are still appropriate.

Works Sited

Baker, Jamie D. and Cynthia I Danville. “Security, Ethics and Privacy”. Computers and Society Journal, Feb. 1998: pp. 29-47. Price, Karen E. , “Identification and Authentication Controls”. pp. 15-18. Victors, Michael R. , The Computer Auditor. St. Louis: Green Valley Publishing Company, 1998. pp. 7. Baker pp. 7

Choose Type of service

Choose writer quality

Page count

1 page 275 words


Order Creative Sample Now

Haven’t Found A Paper?

Let us create the best one for you! What is your topic?

By clicking "SEND", you agree to our terms of service and privacy policy. We'll occasionally send you account related and promo emails.

Eric from Graduateway Hi there, would you like to get an essay? What is your topic? Let me help you


Haven't found the Essay You Want?

Get your custom essay sample

For Only $13.90/page