CIS 1332 Lecture Notes - Lecture 10: Security Question, Data Integrity, Facial Recognition System
Document Summary
What do we need to have (general approach): protecting your assets (physical, digital and virtual, access control, authentication, encryption; confidentiality and data integrity. These steps are applicable to any of the networks to keep them safe and secure: first: all hard(cid:449)are parts (cid:373)ust (cid:271)e i(cid:374) (cid:862)safe(cid:863) pla(cid:272)es. E(cid:272)ure pla(cid:272)e for your server, router/access point, and switches/hubs: second: install user name, password, and different biometrics measure son your computer/networks. Two factors authentications can be uses (user and password + id send as text message, or security question) Something that is not related to you. Numbers and letters and has to be certain characters. It should not be so easy that someone else can simply figure it out. Not a problem for low-risk situations like home computers. In real entity, we need better than biometric technology when it comes to accessing sensitive information. Well, there has been a lot of improvements in this area.