preview

Human And Technological Aspects Of Cyber Threats

Good Essays

Intro
In an age of rapidly expanding data and highly skilled threat actors, technological advancements present the urgent duality of great opportunity and great risk. A universities data is integral to both, and a critical asset that differentiates organizations. While it is impractical to completely ‘lock it down ' and yet it is open, use can threaten the organization 's existence. The challenge for IT team security leaders is striking a delicate balance being security aware and remaining business driven.
The human and technological aspects of cyber threats changed dramatically in the past year. Witnessing new techniques blended with the old, resulting in highly evasive attacks. Recently we have seen big business, corporations, …show more content…

Security Authentication Four processes are in the security authentication process. These steps are: 1) Identification, 2) Authentication, 3) Authorization, and 4) Accountability.
It is vital to integrate these four steps into any network intended to be secure. Properly configured a secured network will be able to protect itself from attacks like PW hacking, DDOS attacks, brute force attacks, and insiders abusing their system rights (internal and external). Identification is the first of the four steps in this process. Any user that expects to gain access to a system referred to as a supplicant, and the tool that every user who gains entry to the network, referred to as an Identifier. The identifier can have many different methods for identifying the supplicant. The identifier should be able to locate the users ' credentials from a database of unique information that determines the supplicants ' identity. The most common form of verification is done using the employees first and last name. In case there are
Coworkers with common names, such as John Doe, employee Id 's or Social Security numbers are utilized. In most companies, they are no longer using the employee 's Social Security number to identify them in their system. They are replacing them with an employee ID. This reduces the information that a network intruder (also known as a hacker) or another employee gaining access to their Social Security numbers.
Authentication is the second

Get Access