SlideShare a Scribd company logo
1 of 1
Download to read offline
List and describe the authentication methods businesses use to protect their information both
internal and externally when transmitted to outside parties?
Solution
Please let me know if you need more information:-
when we say authentication first we need to protest the resources involved in our BUSINESS:-
our business needs should be like:-
1. we must keep avoiding unauthorized persions from accessing the resources.
2. we just limit resources[data] to access the BUSINESS involved persons what they are not
needed.
[ just providing access to what they really needed ]
To gain the above :-
we can follow many methods which are available :-
1.logon authentication
here we will be providing the username and password to the user/resorce to gain access to our
business data.based on userid we can limit the data too.
2.network authentication
based on network type which resource connected we can revoke the connection to our business
network
3.remote authentication
here remote authentcation will be involed in again username along with some security features
[RSA, OTP ..etc].
4.biometric authnetication
based on the resource physical presence of finger print / ratina ..etc scans we will be
authenticating the resources involved in business
5.smart card authentication.
when we give access to our business resources/outside we should be maintainging the encryption
technology to keep our data safe.
when we mention outside we should be able to make our data not understandble till it reaches to
our destination[resources] by using encrytption .
Thanks

More Related Content

Similar to List and describe the authentication methods businesses use to protec.pdf

protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
Rishav Gupta
 
Identity Security.docx
Identity Security.docxIdentity Security.docx
Identity Security.docx
Mohsin Abbas
 

Similar to List and describe the authentication methods businesses use to protec.pdf (20)

protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
 
Identity Management Controls.pdf
Identity Management Controls.pdfIdentity Management Controls.pdf
Identity Management Controls.pdf
 
SECURITY THE POWER OF MULTI-FACTOR AUTHENTICATION
SECURITY THE POWER OF MULTI-FACTOR AUTHENTICATIONSECURITY THE POWER OF MULTI-FACTOR AUTHENTICATION
SECURITY THE POWER OF MULTI-FACTOR AUTHENTICATION
 
A Simplified Guide to the Evolution of Authentication!
A Simplified Guide to the Evolution of Authentication!A Simplified Guide to the Evolution of Authentication!
A Simplified Guide to the Evolution of Authentication!
 
Broken Authentication and Authorization(1).pptx
Broken Authentication and Authorization(1).pptxBroken Authentication and Authorization(1).pptx
Broken Authentication and Authorization(1).pptx
 
Get your Enterprise Ready for GDPR
Get your Enterprise Ready for GDPRGet your Enterprise Ready for GDPR
Get your Enterprise Ready for GDPR
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
 
IT security : a five-legged sheep
IT security : a five-legged sheepIT security : a five-legged sheep
IT security : a five-legged sheep
 
Identity as a Service
Identity as a ServiceIdentity as a Service
Identity as a Service
 
Database Security
Database SecurityDatabase Security
Database Security
 
120 i143
120 i143120 i143
120 i143
 
ADBMS.pptx
ADBMS.pptxADBMS.pptx
ADBMS.pptx
 
Top 5 Ways How Accounting Firms Can Protect Their Client Data
Top 5 Ways How Accounting Firms Can Protect Their Client Data Top 5 Ways How Accounting Firms Can Protect Their Client Data
Top 5 Ways How Accounting Firms Can Protect Their Client Data
 
Best Practices to Protect Customer Data Effectively
Best Practices to Protect Customer Data EffectivelyBest Practices to Protect Customer Data Effectively
Best Practices to Protect Customer Data Effectively
 
TECHNIQUES DATA PRO.pptx
TECHNIQUES DATA PRO.pptxTECHNIQUES DATA PRO.pptx
TECHNIQUES DATA PRO.pptx
 
secure and authentication using personal device ppt
secure and authentication using personal device pptsecure and authentication using personal device ppt
secure and authentication using personal device ppt
 
Identity Security.docx
Identity Security.docxIdentity Security.docx
Identity Security.docx
 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Security issue in e commerce
 
Security as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor TechnologySecurity as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor Technology
 
What is Identity Security.pptx
What is Identity Security.pptxWhat is Identity Security.pptx
What is Identity Security.pptx
 

More from expressionnoveltiesk

There seems to be some evidence supporting the idea of a political b.pdf
There seems to be some evidence supporting the idea of a political b.pdfThere seems to be some evidence supporting the idea of a political b.pdf
There seems to be some evidence supporting the idea of a political b.pdf
expressionnoveltiesk
 
explain how fungi acquire their nutrients. describe the basic body p.pdf
explain how fungi acquire their nutrients. describe the basic body p.pdfexplain how fungi acquire their nutrients. describe the basic body p.pdf
explain how fungi acquire their nutrients. describe the basic body p.pdf
expressionnoveltiesk
 
Define microbial growth. Ftsz and septum are important features of s.pdf
Define microbial growth.  Ftsz and septum are important features of s.pdfDefine microbial growth.  Ftsz and septum are important features of s.pdf
Define microbial growth. Ftsz and septum are important features of s.pdf
expressionnoveltiesk
 
SOMEONE HELP Complete sentences, stating the differences and relati.pdf
SOMEONE HELP Complete sentences, stating the differences and relati.pdfSOMEONE HELP Complete sentences, stating the differences and relati.pdf
SOMEONE HELP Complete sentences, stating the differences and relati.pdf
expressionnoveltiesk
 
Question 12 20 pts Explain five criteria of Statement No. 52 in deter.pdf
Question 12 20 pts Explain five criteria of Statement No. 52 in deter.pdfQuestion 12 20 pts Explain five criteria of Statement No. 52 in deter.pdf
Question 12 20 pts Explain five criteria of Statement No. 52 in deter.pdf
expressionnoveltiesk
 
Please write a project proposal by seeing the following project repo.pdf
Please write a project proposal by seeing the following project repo.pdfPlease write a project proposal by seeing the following project repo.pdf
Please write a project proposal by seeing the following project repo.pdf
expressionnoveltiesk
 
Male, 40 y o. comes to the office. First scheduled the appointment fo.pdf
Male, 40 y o. comes to the office. First scheduled the appointment fo.pdfMale, 40 y o. comes to the office. First scheduled the appointment fo.pdf
Male, 40 y o. comes to the office. First scheduled the appointment fo.pdf
expressionnoveltiesk
 
Let K be a field. Prove that every not trivial (not necessarily fini.pdf
Let K be a field. Prove that every not trivial (not necessarily fini.pdfLet K be a field. Prove that every not trivial (not necessarily fini.pdf
Let K be a field. Prove that every not trivial (not necessarily fini.pdf
expressionnoveltiesk
 

More from expressionnoveltiesk (20)

The major place where grantic continental crust is manufactured is.pdf
The major place where grantic continental crust is manufactured is.pdfThe major place where grantic continental crust is manufactured is.pdf
The major place where grantic continental crust is manufactured is.pdf
 
There seems to be some evidence supporting the idea of a political b.pdf
There seems to be some evidence supporting the idea of a political b.pdfThere seems to be some evidence supporting the idea of a political b.pdf
There seems to be some evidence supporting the idea of a political b.pdf
 
The CSUN IEEE chapter is to choose a president, treasurer and secret.pdf
The CSUN IEEE chapter is to choose a president, treasurer and secret.pdfThe CSUN IEEE chapter is to choose a president, treasurer and secret.pdf
The CSUN IEEE chapter is to choose a president, treasurer and secret.pdf
 
The atmosphere on earth contains nitrogen in a form that is unusable .pdf
The atmosphere on earth contains nitrogen in a form that is unusable .pdfThe atmosphere on earth contains nitrogen in a form that is unusable .pdf
The atmosphere on earth contains nitrogen in a form that is unusable .pdf
 
explain how fungi acquire their nutrients. describe the basic body p.pdf
explain how fungi acquire their nutrients. describe the basic body p.pdfexplain how fungi acquire their nutrients. describe the basic body p.pdf
explain how fungi acquire their nutrients. describe the basic body p.pdf
 
Define microbial growth. Ftsz and septum are important features of s.pdf
Define microbial growth.  Ftsz and septum are important features of s.pdfDefine microbial growth.  Ftsz and septum are important features of s.pdf
Define microbial growth. Ftsz and septum are important features of s.pdf
 
Suppose that a nation has a labor force of 100 people. In January, A.pdf
Suppose that a nation has a labor force of 100 people. In January, A.pdfSuppose that a nation has a labor force of 100 people. In January, A.pdf
Suppose that a nation has a labor force of 100 people. In January, A.pdf
 
For which of the following types of interpolation is it possible, in .pdf
For which of the following types of interpolation is it possible, in .pdfFor which of the following types of interpolation is it possible, in .pdf
For which of the following types of interpolation is it possible, in .pdf
 
SOMEONE HELP Complete sentences, stating the differences and relati.pdf
SOMEONE HELP Complete sentences, stating the differences and relati.pdfSOMEONE HELP Complete sentences, stating the differences and relati.pdf
SOMEONE HELP Complete sentences, stating the differences and relati.pdf
 
Recontruct the cultural differences argumentSolutionCultural d.pdf
Recontruct the cultural differences argumentSolutionCultural d.pdfRecontruct the cultural differences argumentSolutionCultural d.pdf
Recontruct the cultural differences argumentSolutionCultural d.pdf
 
Question 12 20 pts Explain five criteria of Statement No. 52 in deter.pdf
Question 12 20 pts Explain five criteria of Statement No. 52 in deter.pdfQuestion 12 20 pts Explain five criteria of Statement No. 52 in deter.pdf
Question 12 20 pts Explain five criteria of Statement No. 52 in deter.pdf
 
Please write a project proposal by seeing the following project repo.pdf
Please write a project proposal by seeing the following project repo.pdfPlease write a project proposal by seeing the following project repo.pdf
Please write a project proposal by seeing the following project repo.pdf
 
Does a countrys Institutional and legal system play a major role i.pdf
Does a countrys Institutional and legal system play a major role i.pdfDoes a countrys Institutional and legal system play a major role i.pdf
Does a countrys Institutional and legal system play a major role i.pdf
 
Most primate species    a. live in social groups.    b. live sol.pdf
Most primate species    a. live in social groups.    b. live sol.pdfMost primate species    a. live in social groups.    b. live sol.pdf
Most primate species    a. live in social groups.    b. live sol.pdf
 
please do D E and F .C. Describe loads on Structures wl liui. . D..pdf
please do D E and F .C. Describe loads on Structures wl liui. . D..pdfplease do D E and F .C. Describe loads on Structures wl liui. . D..pdf
please do D E and F .C. Describe loads on Structures wl liui. . D..pdf
 
Male, 40 y o. comes to the office. First scheduled the appointment fo.pdf
Male, 40 y o. comes to the office. First scheduled the appointment fo.pdfMale, 40 y o. comes to the office. First scheduled the appointment fo.pdf
Male, 40 y o. comes to the office. First scheduled the appointment fo.pdf
 
Describe and discuss the 2 pathways for antigen processing exogenou.pdf
Describe and discuss the 2 pathways for antigen processing exogenou.pdfDescribe and discuss the 2 pathways for antigen processing exogenou.pdf
Describe and discuss the 2 pathways for antigen processing exogenou.pdf
 
Let X equal the number of flips of a fair cointhat are required to.pdf
Let X equal the number of flips of a fair cointhat are required to.pdfLet X equal the number of flips of a fair cointhat are required to.pdf
Let X equal the number of flips of a fair cointhat are required to.pdf
 
Let K be a field. Prove that every not trivial (not necessarily fini.pdf
Let K be a field. Prove that every not trivial (not necessarily fini.pdfLet K be a field. Prove that every not trivial (not necessarily fini.pdf
Let K be a field. Prove that every not trivial (not necessarily fini.pdf
 
It is important that the CISSP candidate understand the differences .pdf
It is important that the CISSP candidate understand the differences .pdfIt is important that the CISSP candidate understand the differences .pdf
It is important that the CISSP candidate understand the differences .pdf
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
httgc7rh9c
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 

Recently uploaded (20)

Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Our Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdfOur Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdf
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 

List and describe the authentication methods businesses use to protec.pdf

  • 1. List and describe the authentication methods businesses use to protect their information both internal and externally when transmitted to outside parties? Solution Please let me know if you need more information:- when we say authentication first we need to protest the resources involved in our BUSINESS:- our business needs should be like:- 1. we must keep avoiding unauthorized persions from accessing the resources. 2. we just limit resources[data] to access the BUSINESS involved persons what they are not needed. [ just providing access to what they really needed ] To gain the above :- we can follow many methods which are available :- 1.logon authentication here we will be providing the username and password to the user/resorce to gain access to our business data.based on userid we can limit the data too. 2.network authentication based on network type which resource connected we can revoke the connection to our business network 3.remote authentication here remote authentcation will be involed in again username along with some security features [RSA, OTP ..etc]. 4.biometric authnetication based on the resource physical presence of finger print / ratina ..etc scans we will be authenticating the resources involved in business 5.smart card authentication. when we give access to our business resources/outside we should be maintainging the encryption technology to keep our data safe. when we mention outside we should be able to make our data not understandble till it reaches to our destination[resources] by using encrytption . Thanks