MGMT 3265 Chapter Notes - Chapter 8: Intrusion Detection System, Public-Key Cryptography, Content-Control Software

107 views4 pages

Document Summary

8. 4 technologies and tools for protecting information resources. *tools for managing user identities, preventing unauthorized access to systems and data, ensuring system availability, and ensuring software quality. Refers to the ability to know that a person is who he or she claims to be. Often established by using passwords known only to authorized users. Passwords can be sniffed, though, if transmitted over a network or stolen through social engineering. Physical device, similar to an identification card, design to prove the identity of a single user. Small gadgets that typically fit on key rings and display passcodes that change frequently. Device about the size of a credit card that contains a chip formatted with access permission and other data. Uses systems that read and interpret individual human traits, such as fingerprints, irises, and voices, in order to grant or deny access. Based on the measurement of a physical or behavioral trait that makes each individual unique.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents