Task 5 computer security systems

Posted: October 30, 2011 in Sistem Keamanan Komputer
Tags:

– Design additional authentication information beside using username.

Enter username     = Anto

Enter password     = *********

put your finger on the fingerprint machine

Infalid acces

_____________________________________

Enter username     = Anto

Enter password = *********

put your finger on the fingerprint machine

successful access. welcome to the xyz computing systems.

To be able to get into computing systems above, the admin must fill in name and password correctly, the admin also need to match your fingerprint on the machine to be able to access computing systems.

 

– Design authentication mechanism that involves combines of: user knows + user has + user is.

when the sweepstakes is conducted by a television station by telephone, host of the pin scrambles to determine the winner and then call the owner of the pin. Before the host will allow you to follow the quiz, the quiz you will be asked a password when the password can answer correctly you can follow the quiz. Gifts can be taken to show identity cards such as ID cards, driver’s license, etc. The officer who delivered the prize will also match the identity that is given prior to the ID card or other identity cards and see the same picture on the identity of the winner of the visit.

User knows = pin is encrypted and password that was said as a condition to follow the quiz.
User = show his ID card, driver’s license, etc.
User is = officer match the photos on the ID card, driver’s license or other identification to face the winner of the visit.

 

– Give examples environtment which suitable for applying allnone protection.

Environment suitable for implementing such allone protection position at the supermarket cashier, the cashier was entrusted by the owner of the supermarket to save money from the sale of existing products in the supermarket. Supermarket owners will just give cashier positions to people who already he believes, because it involves money from the sale. If a cashier abusing his position then the owner of the supermarket can be a big loss.

 

– Give examples environtment which suitable for applying group protection.

group protection suitable to be applied in office environments consisting of many staff in one company. A staff and other staff can each other any information or files that can run the company as well, but there is also some information that can only be accessed by a particular staff or a specific user only. For example data on corporate finance can only be accessed by the financial part only, not accessible by other staff to maintain confidentiality.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s