Cybersecurity – Coursework Example
CYBER SECURITY STRONG PASSWORD AUTHENTICATION AND USER FRIENDLY Ways an organization can streamline the administration required to implement and maintain strong authentication solution.
Authentication is a process by which a computer system identifies the correct user and allows the user to access secure information. This process has been faced with so many challenges including phishing, password hacking, password harvesting and man in browsing e.t.c.
An organization can tackle the authentication challenges by streamlining its administration to ensure strong authentication solution. This can be achieved by sensitizing its staff on the importance of maintaining a strong and secret password and giving them a teaching on how to generate a strong password.
The second way is by introduction of a two factor authentication system. This method requires one to input two simultaneous passwords. This can be made stronger by implementing a policy that the two passwords are generated by different person’s maybe a manager and data user. Jablon.D “Password Authentication Using Multiple Servers.rsa cryptographers’ track 2001, lncs vol. 2020, springer-verlag, pp. 344-360.
Thirdly the organization can curb password harvesting by introducing different passwords to access different information or different databases. This makes it difficult for one to break through many passwords. Neuman .B and Ts’o .T, ‘Kerberos: An Authentication service for computer networks’ IEE Communications, vol. 32 No.9, pp. 33-38, 1994
2. Ways in which strong authentication is made user friendly without compromising its effectiveness.
The use of strong authentication passwords has challenges that make it the use of two factor authentication non user friendly hence causing some ineffectiveness. To make the use of strong password user friendly, application of cloud based solutions like Deepnet Unfitted authentication software. Gustavo Cardoso ‘The media in network society’ 2006, pp.293-307
Deepnet unfitted utilizes the readily available devices like phones, computers e.tc. or users behavioral biometrics like typing of a pattern or voiceprint. This makes the system cost effective, user friendly and easy to manage. Users are not required to memorize passwords or carry heavy tokens all they need is just a simple cell phone and the organization achieve a secured authentication. AHOKAS, Ira, KAIVO-OJA, Jari (2003), Benchmarking European Information Society Development, Foresight, 5,1 page. 44-54.