Page 76 - DCAP516_COMPUTER_SECURITY
P. 76

Computer Security




                    Notes          Authenticity: It refers to the constant checks you have to run on the system to make sure
                                   sensitive areas are protected and working properly.
                                   Authorization: It refers to the power you have over distinguishing authorized users from
                                   unauthorized users, and levels of access in-between.
                                   Biometrics: It is the science and technology of measuring and analyzing biological data.

                                   6.11 Review Questions


                                   1.  What do you mean by user authentication?
                                   2.  Describe user authentication method.
                                   3.  Why user authentication is necessary?
                                   4.  Compare and contrast between authorization and authentication.
                                   5.  How do passwords act as an important tool for user authentication?

                                   6.  What are the various types of attacks on passwords? Discuss in detail.
                                   7.  Describe the various points that must be kept in mind while password selection.
                                   8.  Explain biometrics and its use in user authentication.

                                   Answers: Self Assessment

                                   1.  True                              2.   True

                                   3.  False                             4.   True
                                   5.  False                             6.   True
                                   7.  User authentication               8.   Personal Identification Number
                                   9.  Global Positioning Satellite      10.  Authentication Policies

                                   6.12 Further Readings





                                   Books       Managing Enterprise Information Integrity: Security, Control and Audit Issues, IT
                                               Governance Institute.
                                               Risks of Customer Relationship Management: A Security, Control, and Audit Approach,
                                               PricewaterhouseCoopers Llp.
                                               Security, Audit & Control Features PeopleSoft: A Technical and Risk Management
                                               Reference Guide, 2nd Edition, Deloitte Touche Tohmatsu Research Team, ISACA.

                                               William Stallings, Computer Security: Principles and Practice, Prentice Hall, 2008.















          70                                LOVELY PROFESSIONAL UNIVERSITY
   71   72   73   74   75   76   77   78   79   80   81