1,901
9
Essay, 2 pages (300 words)

Authentication administration practices essay examples

Information or system access control is almost a necessity in every organization that seeks to perform and achieve productivity. Authentication is the most commonly used mechanism in bid to achieve confidentiality, privacy and solely authorized access to information and the systems at large (Baier, 2010).
The response given to the issue of authentication administrative practices is true but not exhaustive. The Anderson proposal of a two-channel authentication given is one but not the only measure that can be employed (Baier, 2010). Two-way authentication is where the user reveals his/her identity to the system before being allowed to access it, and in return the system is expected to prove authenticity to the user. This helps prevent hacking issues, especially in cases where the user’s passwords and username are the only details required for logging in.
The given response explains use of biometrics in authentication, though not in a comprehensive manner. Just a part of Anderson’s explanation on biometrics is given in the response, where it discusses use of mobile devices to enhance authentication. It’s focused on protecting the user, as opposed to the devices as most mechanisms do. The user becomes the main determinant of their identity and not the capability of the systems (Martin, 2009).
In the response, it’s outlined that the shortcomings inherent in wireless devices may compromise the authentication standards. To an extent this is factual; however, with proper manipulation and use of the devices this may not be experienced. The devices are not entirely involved in ensuring strong authentication, but simply leveraged to boost the mechanisms that are already in place.
Its, also, of great importance that the response recognizes and appreciates installation of applications and setting of measures that will govern data storage, transmission and other transactions as a major practice towards ensuring strong authentication (Martin, 2009).

References

Baier, D. (2010). A guide to claims-based identity and access control authentication and authorization for services and the web.. Redmond, Wash.: Microsoft.
Martin, L. (2009). Biometrics. Vacca, J. R. (Ed.), Computer and information security handbook. Boston, MA: Morgan Kaufmann Publishers.

Thank's for Your Vote!
Authentication administration practices essay examples. Page 1
Authentication administration practices essay examples. Page 2
Authentication administration practices essay examples. Page 3

This work, titled "Authentication administration practices essay examples" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Authentication administration practices essay examples'. 12 September.

Reference

AssignBuster. (2022, September 12). Authentication administration practices essay examples. Retrieved from https://assignbuster.com/authentication-administration-practices-essay-examples/

References

AssignBuster. 2022. "Authentication administration practices essay examples." September 12, 2022. https://assignbuster.com/authentication-administration-practices-essay-examples/.

1. AssignBuster. "Authentication administration practices essay examples." September 12, 2022. https://assignbuster.com/authentication-administration-practices-essay-examples/.


Bibliography


AssignBuster. "Authentication administration practices essay examples." September 12, 2022. https://assignbuster.com/authentication-administration-practices-essay-examples/.

Work Cited

"Authentication administration practices essay examples." AssignBuster, 12 Sept. 2022, assignbuster.com/authentication-administration-practices-essay-examples/.

Get in Touch

Please, let us know if you have any ideas on improving Authentication administration practices essay examples, or our service. We will be happy to hear what you think: [email protected]