Page 76 - DCAP516_COMPUTER_SECURITY
P. 76
Computer Security
Notes Authenticity: It refers to the constant checks you have to run on the system to make sure
sensitive areas are protected and working properly.
Authorization: It refers to the power you have over distinguishing authorized users from
unauthorized users, and levels of access in-between.
Biometrics: It is the science and technology of measuring and analyzing biological data.
6.11 Review Questions
1. What do you mean by user authentication?
2. Describe user authentication method.
3. Why user authentication is necessary?
4. Compare and contrast between authorization and authentication.
5. How do passwords act as an important tool for user authentication?
6. What are the various types of attacks on passwords? Discuss in detail.
7. Describe the various points that must be kept in mind while password selection.
8. Explain biometrics and its use in user authentication.
Answers: Self Assessment
1. True 2. True
3. False 4. True
5. False 6. True
7. User authentication 8. Personal Identification Number
9. Global Positioning Satellite 10. Authentication Policies
6.12 Further Readings
Books Managing Enterprise Information Integrity: Security, Control and Audit Issues, IT
Governance Institute.
Risks of Customer Relationship Management: A Security, Control, and Audit Approach,
PricewaterhouseCoopers Llp.
Security, Audit & Control Features PeopleSoft: A Technical and Risk Management
Reference Guide, 2nd Edition, Deloitte Touche Tohmatsu Research Team, ISACA.
William Stallings, Computer Security: Principles and Practice, Prentice Hall, 2008.
70 LOVELY PROFESSIONAL UNIVERSITY