Category: Information Security

2.3 – Authentication Techniques

Password – In private and public computer networks, authentication is usually done with the use of login IDs (user names) and passwords. Knowledge of the login details is pretended to make sure that the user is authentic. Each user registers…
2.2 – Account Accessibility

Identification – The identification procedure collects information about who applied for access. This procedure is generally used by the unique machine-readable names. Based on this system, authentications are validated, enabling access. In terms of human, users and resource connect in…
2.1 – Account Administration

Creating a new user is a simple procedure, but it must be secured and protected with organizational security policy procedures. User accounts should not be created at anyone’s request or urge of an admin. Rather, a strict process should be…
2.0 – Access Control Techniques

The basic construct in the establishment of information security regime is regulating how resources which are to be accessed will be protected against network vulnerabilities. The control mechanisms deployed vary in nature, and could be administrative, physical or technical. Access…