CIS 1332 Lecture Notes - Lecture 10: Security Question, Data Integrity, Facial Recognition System

70 views3 pages

Document Summary

What do we need to have (general approach): protecting your assets (physical, digital and virtual, access control, authentication, encryption; confidentiality and data integrity. These steps are applicable to any of the networks to keep them safe and secure: first: all hard(cid:449)are parts (cid:373)ust (cid:271)e i(cid:374) (cid:862)safe(cid:863) pla(cid:272)es. E(cid:272)ure pla(cid:272)e for your server, router/access point, and switches/hubs: second: install user name, password, and different biometrics measure son your computer/networks. Two factors authentications can be uses (user and password + id send as text message, or security question) Something that is not related to you. Numbers and letters and has to be certain characters. It should not be so easy that someone else can simply figure it out. Not a problem for low-risk situations like home computers. In real entity, we need better than biometric technology when it comes to accessing sensitive information. Well, there has been a lot of improvements in this area.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents