SUMMARY: Securing of a file or information is very essential nowadays. Information is an asset that requires protection commensurate with its value. Security measures must be taken to protect information from an unauthorized modification, destruction, or disclosure wether accidental or intentional. Authentication is a process in which the credentials provided are compared to those on file in a database of authorized user's information on a local operating system or within an authentication server. If the credentials match, therefore the process is completed and the user is granted authorization for access. And there are authentication factors to be considered; first is knowledge factors. In this category of authentication credentials, it consists of information that the user posseses, such as personal identification number (PIN), a username, a password, or the answer to the secret question. Second is Possesion Factors. In this category, it is based on items that the user has with them, typically a hardware device such as a security token or a mobile phone used in conjunction with a software token. And the last one is Inference Factors. In this category, it consists of elements that are integral to the individual in question, in the form of biometric data. It is always better to prevent, then to pursue and prosecute. During the prevention phase, security policies, controls and processes should be deaigned and implemented. Security policies, security awareness programs and access control procedures, are all interrelated and should be developed early on. The information security policy is the corner store from which all else is built. Operating system's processes and kernel do the designated task as instructed. If the user program made these process do malicious tasks, then it is known as Program Threats. Following is the list of some well-known program threat that can be installed in a computer which can store and send user credentials via network to some hacker; The trojan Horse, Trap Door, Logic Bomb, and Virus.
SUMMARY:
TumugonBurahinSecuring of a file or information is very essential nowadays. Information is an asset that requires protection commensurate with its value. Security measures must be taken to protect information from an unauthorized modification, destruction, or disclosure wether accidental or intentional.
Authentication is a process in which the credentials provided are compared to those on file in a database of authorized user's information on a local operating system or within an authentication server. If the credentials match, therefore the process is completed and the user is granted authorization for access. And there are authentication factors to be considered; first is knowledge factors. In this category of authentication credentials, it consists of information that the user posseses, such as personal identification number (PIN), a username, a password, or the answer to the secret question. Second is Possesion Factors. In this category, it is based on items that the user has with them, typically a hardware device such as a security token or a mobile phone used in conjunction with a software token. And the last one is Inference Factors. In this category, it consists of elements that are integral to the individual in question, in the form of biometric data.
It is always better to prevent, then to pursue and prosecute. During the prevention phase, security policies, controls and processes should be deaigned and implemented. Security policies, security awareness programs and access control procedures, are all interrelated and should be developed early on. The information security policy is the corner store from which all else is built.
Operating system's processes and kernel do the designated task as instructed. If the user program made these process do malicious tasks, then it is known as Program Threats. Following is the list of some well-known program threat that can be installed in a computer which can store and send user credentials via network to some hacker; The trojan Horse, Trap Door, Logic Bomb, and Virus.