SlideShare a Scribd company logo
1. Respond to other student Discussion Board providing
additional insights, feedback and/or examples as applicable.
Discussion Board of another student:
It is almost impossible to fully secure an online or mobile
account with just password. Data breaches ,malware, device
theft, and myriad other methods can be used to compromise
digital passwords, no matter how secure they are. That's why
anyone with sensitive information or data protected by a
password needs a second method of securing their account,
hence two-factor authentication ( Vigliarolo, 2020). Two-factor
authentication is a supplement to a digital password that, when
used properly, makes it harder for a cybercriminal to access a
compromised account. Two-factor authentication is also
referred to as 2FA, two-step verification, login verification, and
two-step authentication. Two factor authentication goes along
with a password as second form of identity verification. How
this works is upon successful login into an account with
password user is prompted to either confirm their identity
using a one-button push with a verification app or input a
random security code from a text, email, push notification, or
physical key. The second factor is, ideally, harder to spoof than
a password; it requires something the legitimate user has
physical access to, like a smartphone with a particular
authenticator app installed, a linked phone number for a push
notification or SMS authentication code, or a hardware security
key, which leaves a hacker stuck even if they have the correct
password to the account. some form of two factor
authentications are biometrics like Touch ID , authenticator
apps, SMS authentication, email authentication, or a physical
security key to authenticate an account with an authentication
code.
Each method has its pros and cons, and two-factor
authentication shouldn't be relied on to be the end-all, be-all of
account security. Each of those methods can be cracked by
someone with enough knowledge or drive. SMS and email
authentication, easily the most ubiquitous, are also the most
easily cracked. Text messages aren't secure and can be
intercepted, and email accounts can be hacked. Anyone who has
spent time online knows it's a bad idea to put all their security
eggs in a single basket, and two-factor authentication is no
exception. Couple years ago CNET reported RSA's physical
security tokens were hacked, so even systems you think are
secure (like random number generators) can be exploited. The
biggest security hole in two-factor authentication, and the one
most often exploited is social engineering. Social engineering is
essentially people hacking instead of trying to break encryption,
brute-force passwords, or crack RSA tokens a social engineer
goes for the path of least resistance by phishing, pretexting,
phone spoofing, or otherwise lying to extract information from
people who don't realize they're giving up sensitive data to a
person who shouldn't have it.
References :
Vigliarolo, Brandon. "Two -factor authentication : A cheat
Sheet"
TechRepublic 11 June 2020
https://www.techrepublic.com/article/two-factor-authentication-
cheat-sheet/
Respond here:
2. Responding to their Discussion Board with additional
information, feedback and examples as applicable.
Discussion board of another student:
The term “Access Control” refers to “the control of access to
system resources after a user’s account credentials and identity
have been authenticated and access to the system has been
granted.” (University of Hawai'i, 2021) Having adequate access
controls are vital to ensuring the security of information held on
an enterprise network from unintentional (or intentional)
modification. The three types of access controls are
Discretionary Access Control (DAC), Mandatory Access
Control (MAC), Role-Based Access Control (RBAC), and
Attribute-Based Access Control (ABAC). Each of these
controls has their own strengths and weaknesses, however it is
important for businesses to adopt the appropriate access control
model based on the needs of their employees, as well as the
information protected.
Discretionary Access Control (DAC) is a simplistic approach to
data control, whereas the data owner decides on the permissions
granted to the specific information. Under this type of control,
persons that have been granted access to the information have
the ability to pass the information to other individuals or
objects, grant privileges to other individuals, change attributes
regarding security and other characteristics, specify security
attributes associated with newly-created objects, or dictate the
overarching rules regarding access controls to the information.
While easy to apply, this type of access control is extremely
difficult to regulate due to the fluid nature of permissions
granted once the data owner issues the initial access
permissions. Mandatory Access Control (MAC), which
improves on the weak points of DAC, is an access policy in
which all individuals and objects within the technical purview
of the data owner have uniform security controls applied to
them. Subjects that are granted access to information are
inhibited from distributing the data to unauthorized sources,
granting privileges to other individuals, changing security
controls, or changing the governing access control. MAC is,
traditionally, the most common access control applied due to its
inclusive nature.
Role-Based Access Control (RBAC) is, as could be extrapolated
from the name, access control based on user roles. This means
that a user that receives access to data based on the assumption
of a given role, whether explicit or implicit, is a role-based
access control. This type of access control ensures that
information is only accessed by personnel that require access,
and any modifications are done only by authorized personnel.
This also means that the data owner, while the originator of the
information, may not have access to further modify the data
after its inception. Security principles such as “least privilege”
and “separation of privilege” are in effect in this type of access
control, and play a pivotal role in ensuring the integrity of the
data that it protects.
The final access control, Attribute-Based Access Control, is
more complicated and thus less likely to be utilized in an
enterprise environment. Under this type of access control
resources and users are assigned and organized by “attributes”
such as time of day or position and location, and their access is
based on these factors. Known as a dynamic access control, this
type of control benefits critical operational information and
sensitive data. If the information does not geographically move
(aka a SCIF or some sort of classified facility), then ABAC can
be considered as the most secure type of access control for
high-priority information.
All of this being said, in the end the question is not “Do I need
a form access control?”, but rather “What type of access control
best suits my company needs?” The secrecy and severity of
information, least privilege, and geographic location will
determine the needs of the organization and how read, write,
modify, and delete permissions are applied. Knowing your
organization and its requirements are the most important factor.
Also, it is important to ensure that your company has a
competent Change Management Board (CMB) and that the type
of access control is evaluated upon, thoroughly tested in a
sandbox environment, and implemented in a manner that
supports continuity of business operations.
References
University of Hawai'i. (2021). Access Control Models – UHWO
Cyber Security. Westoahu.hawaii.edu. Retrieved 15 November
2021, from https://westoahu.hawaii.edu/cyber/best-
practices/best-practices-weekly-summaries/access-control/.
Respond here:
Running head: ANNOTATED BIBLIOGRAPHY 1
ANNOTATED BIBLIOGRAPHY 4
Week 3: Annotated Bibliography for Final Project
Your Name
University of Arizona Global Campus
CRJ 201: Introduction to Criminal Justice
Instructor's Name
Month Day, Year
Want to view a sample annotated bibliography? Need further
help?
Ctrl+Click: Annotated Bibliography
Week 3: Annotated Bibliography for Final Project
Author, A. (Year Published). Article title. Journal Name,
Volume(Issue), page range. doi:# or Retrieved from journal’s
homepage URL
In the first paragraph of your annotation, summarize the main
points of the source that you found to support the ideas in Case
#1. This source should address the criminal justice issue of law
enforcement communication in multilingual communities.
In the second paragraph of your annotation, explain how the
source is relevant to your Final Project. Explain how this
particular source relates to the ideas discussed in Case #1.
Explain how this source will help you develop your Final
Project.
Author, A. (Year Published). Article title. Journal Name,
Volume(Issue), page range. doi:# or Retrieved from journal’s
homepage URL
In the first paragraph of your annotation, summarize the main
points of the source that provides insight into how criminology
may apply to a program, practice, approach, or policy relevant
to a criminal justice issue in Case #1.
In the second paragraph of your annotation, explain how the
source is relevant to your Final Project. Explain how this
particular source relates to criminology and a program, practice,
approach, or policy discussed in Case #1. Explain how this
source will help you develop your Final Project.
Author, A. (Year Published). Article title. Journal Name,
Volume(Issue), page range. doi:# or Retrieved from journal’s
homepage URL
In the first paragraph of your annotation, summarize the main
points of the source that you found to support the ideas in Case
#2. This source should be relevant to the criminal justice issue
of juror exclusion by race in a criminal case.
In the second paragraph of your annotation, explain how the
source is relevant to your Final Project. Explain how this
particular source relates to the ideas discussed in Case #2.
Explain how this source will help you develop your Final
Project.
Author, A. (Year Published). Article title. Journal Name,
Volume(Issue), page range. doi:# or Retrieved from journal’s
homepage URL
In the first paragraph of your annotation, summarize the main
points of the source that you found to support the ideas in Case
#3. This source should address the criminal justice issue of cell
conditions within the context of Eighth Amendment
considerations.
In the second paragraph of your annotation, explain how the
source is relevant to your Final Project. Explain how this
particular source relates to the ideas discussed in Case #3.
Explain how this source will help you develop your Final
Project.
Author, A. (Year Published). Article title. Journal Name,
Volume(Issue), page range. doi:# or Retrieved from journal’s
homepage URL
In the first paragraph of your annotation, summarize the main
points of the source that you found to support the ideas in this
section of your paper. This source will address the critical
perspective of the criminal justice issue that you chose, relevant
to any of the three cases.
In the second paragraph of your annotation, explain how the
source is relevant to your Final Project. Explain how this
particular source relates to a critical perspective of a criminal
justice issue relevant to any of the three cases. Explain how
this source will help you develop your Final Project.
Tip 1: Note that references are listed in alphabetical order.
Tip 2: When including a URL for an online journal, you must
search for the journal’s home page and include this in your
reference entry. You may not include the URL found through
your university library, as readers will not have access to this
library.
Tip 3: Delete these “hints” (purple boxes) before turning in
your final assignment.
Need more help formatting other types of sources?
Ctrl+Click: Formatting Your References

More Related Content

Similar to 1. Respond to other student Discussion Board providing additional

Implementing Physical Security As An Access Control Plan
Implementing Physical Security As An Access Control PlanImplementing Physical Security As An Access Control Plan
Implementing Physical Security As An Access Control Plan
Angie Willis
 
Risk-based Authentication In Cloud | Sysfore
Risk-based Authentication In Cloud | SysforeRisk-based Authentication In Cloud | Sysfore
Risk-based Authentication In Cloud | Sysfore
Sysfore Technologies
 
Technology & Product Review for Identity Governance & Administration.docx
Technology & Product Review for Identity Governance & Administration.docxTechnology & Product Review for Identity Governance & Administration.docx
Technology & Product Review for Identity Governance & Administration.docx
jacqueliner9
 
An Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationAn Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an Organization
IJERA Editor
 
Icit analysis-identity-access-management
Icit analysis-identity-access-managementIcit analysis-identity-access-management
Icit analysis-identity-access-management
Mark Gibson
 
Developing User Authentication by Knowledge Based Authentication Scheme in G...
 Developing User Authentication by Knowledge Based Authentication Scheme in G... Developing User Authentication by Knowledge Based Authentication Scheme in G...
Developing User Authentication by Knowledge Based Authentication Scheme in G...
IJCSIS Research Publications
 
User access profiling model
User access profiling modelUser access profiling model
User access profiling model
Jose Guerrero
 
CSIA 310 Cybersecurity Processes & TechnologiesCase Study #2 T.docx
CSIA 310 Cybersecurity Processes & TechnologiesCase Study #2 T.docxCSIA 310 Cybersecurity Processes & TechnologiesCase Study #2 T.docx
CSIA 310 Cybersecurity Processes & TechnologiesCase Study #2 T.docx
annettsparrow
 
Get Ahead of your Next Security Breach
Get Ahead of your Next Security BreachGet Ahead of your Next Security Breach
Get Ahead of your Next Security Breach
Abhishek Sood
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
DMIMarketing
 

Similar to 1. Respond to other student Discussion Board providing additional (11)

C02
C02C02
C02
 
Implementing Physical Security As An Access Control Plan
Implementing Physical Security As An Access Control PlanImplementing Physical Security As An Access Control Plan
Implementing Physical Security As An Access Control Plan
 
Risk-based Authentication In Cloud | Sysfore
Risk-based Authentication In Cloud | SysforeRisk-based Authentication In Cloud | Sysfore
Risk-based Authentication In Cloud | Sysfore
 
Technology & Product Review for Identity Governance & Administration.docx
Technology & Product Review for Identity Governance & Administration.docxTechnology & Product Review for Identity Governance & Administration.docx
Technology & Product Review for Identity Governance & Administration.docx
 
An Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationAn Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an Organization
 
Icit analysis-identity-access-management
Icit analysis-identity-access-managementIcit analysis-identity-access-management
Icit analysis-identity-access-management
 
Developing User Authentication by Knowledge Based Authentication Scheme in G...
 Developing User Authentication by Knowledge Based Authentication Scheme in G... Developing User Authentication by Knowledge Based Authentication Scheme in G...
Developing User Authentication by Knowledge Based Authentication Scheme in G...
 
User access profiling model
User access profiling modelUser access profiling model
User access profiling model
 
CSIA 310 Cybersecurity Processes & TechnologiesCase Study #2 T.docx
CSIA 310 Cybersecurity Processes & TechnologiesCase Study #2 T.docxCSIA 310 Cybersecurity Processes & TechnologiesCase Study #2 T.docx
CSIA 310 Cybersecurity Processes & TechnologiesCase Study #2 T.docx
 
Get Ahead of your Next Security Breach
Get Ahead of your Next Security BreachGet Ahead of your Next Security Breach
Get Ahead of your Next Security Breach
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
 

More from TatianaMajor22

Please readRobert Geraci, Russia Minorities and Empire,” in .docx
Please readRobert Geraci, Russia Minorities and Empire,” in .docxPlease readRobert Geraci, Russia Minorities and Empire,” in .docx
Please readRobert Geraci, Russia Minorities and Empire,” in .docx
TatianaMajor22
 
Ford VS ChevroletThere are many reasons that make the Chevy.docx
Ford VS ChevroletThere are many reasons that make the Chevy.docxFord VS ChevroletThere are many reasons that make the Chevy.docx
Ford VS ChevroletThere are many reasons that make the Chevy.docx
TatianaMajor22
 
Fairness and Discipline     Weve all been disciplined at one.docx
Fairness and Discipline     Weve all been disciplined at one.docxFairness and Discipline     Weve all been disciplined at one.docx
Fairness and Discipline     Weve all been disciplined at one.docx
TatianaMajor22
 
Appendix 12A Statement of Cash Flows—Direct MethodLEARNING .docx
Appendix 12A Statement of Cash Flows—Direct MethodLEARNING .docxAppendix 12A Statement of Cash Flows—Direct MethodLEARNING .docx
Appendix 12A Statement of Cash Flows—Direct MethodLEARNING .docx
TatianaMajor22
 
Effects of StressProvide a 1-page description of a stressful .docx
Effects of StressProvide a 1-page description of a stressful .docxEffects of StressProvide a 1-page description of a stressful .docx
Effects of StressProvide a 1-page description of a stressful .docx
TatianaMajor22
 
Design Factors NotesCIO’s Office 5 People IT Chief’s Offi.docx
Design Factors NotesCIO’s Office 5 People IT Chief’s Offi.docxDesign Factors NotesCIO’s Office 5 People IT Chief’s Offi.docx
Design Factors NotesCIO’s Office 5 People IT Chief’s Offi.docx
TatianaMajor22
 
Question 12.5 pointsSaveThe OSU studies concluded that le.docx
Question 12.5 pointsSaveThe OSU studies concluded that le.docxQuestion 12.5 pointsSaveThe OSU studies concluded that le.docx
Question 12.5 pointsSaveThe OSU studies concluded that le.docx
TatianaMajor22
 
Case Study 1 Questions1.     What is the allocated budget .docx
Case Study 1 Questions1.     What is the allocated budget  .docxCase Study 1 Questions1.     What is the allocated budget  .docx
Case Study 1 Questions1.     What is the allocated budget .docx
TatianaMajor22
 
Behavior in OrganizationsIntercultural Communications Exercise .docx
Behavior in OrganizationsIntercultural Communications Exercise .docxBehavior in OrganizationsIntercultural Communications Exercise .docx
Behavior in OrganizationsIntercultural Communications Exercise .docx
TatianaMajor22
 
Discussion Question Comparison of Theories on Anxiety Disord.docx
Discussion Question Comparison of Theories on Anxiety Disord.docxDiscussion Question Comparison of Theories on Anxiety Disord.docx
Discussion Question Comparison of Theories on Anxiety Disord.docx
TatianaMajor22
 
I have always liked Dustin Hoffmans style of acting, in this mov.docx
I have always liked Dustin Hoffmans style of acting, in this mov.docxI have always liked Dustin Hoffmans style of acting, in this mov.docx
I have always liked Dustin Hoffmans style of acting, in this mov.docx
TatianaMajor22
 
Is obedience to the law sufficient to ensure ethical behavior Wh.docx
Is obedience to the law sufficient to ensure ethical behavior Wh.docxIs obedience to the law sufficient to ensure ethical behavior Wh.docx
Is obedience to the law sufficient to ensure ethical behavior Wh.docx
TatianaMajor22
 
If you are using the Blackboard Mobile Learn IOS App, please clic.docx
If you are using the Blackboard Mobile Learn IOS App, please clic.docxIf you are using the Blackboard Mobile Learn IOS App, please clic.docx
If you are using the Blackboard Mobile Learn IOS App, please clic.docx
TatianaMajor22
 
Is the proliferation of social media and communication devices a .docx
Is the proliferation of social media and communication devices a .docxIs the proliferation of social media and communication devices a .docx
Is the proliferation of social media and communication devices a .docx
TatianaMajor22
 
MATH 107 FINAL EXAMINATIONMULTIPLE CHOICE1. Deter.docx
MATH 107 FINAL EXAMINATIONMULTIPLE CHOICE1. Deter.docxMATH 107 FINAL EXAMINATIONMULTIPLE CHOICE1. Deter.docx
MATH 107 FINAL EXAMINATIONMULTIPLE CHOICE1. Deter.docx
TatianaMajor22
 
If the CIO is to be valued as a strategic actor, how can he bring.docx
If the CIO is to be valued as a strategic actor, how can he bring.docxIf the CIO is to be valued as a strategic actor, how can he bring.docx
If the CIO is to be valued as a strategic actor, how can he bring.docx
TatianaMajor22
 
I am showing below the proof of breakeven, which is fixed costs .docx
I am showing below the proof of breakeven, which is fixed costs .docxI am showing below the proof of breakeven, which is fixed costs .docx
I am showing below the proof of breakeven, which is fixed costs .docx
TatianaMajor22
 
Examine the way in which death and dying are viewed at different .docx
Examine the way in which death and dying are viewed at different .docxExamine the way in which death and dying are viewed at different .docx
Examine the way in which death and dying are viewed at different .docx
TatianaMajor22
 
Karimi 1 Big Picture Blog Post ​ First Draft College .docx
Karimi 1 Big Picture Blog Post ​ First Draft College .docxKarimi 1 Big Picture Blog Post ​ First Draft College .docx
Karimi 1 Big Picture Blog Post ​ First Draft College .docx
TatianaMajor22
 
Please try not to use hard words Thank youWeek 3Individual.docx
Please try not to use hard words Thank youWeek 3Individual.docxPlease try not to use hard words Thank youWeek 3Individual.docx
Please try not to use hard words Thank youWeek 3Individual.docx
TatianaMajor22
 

More from TatianaMajor22 (20)

Please readRobert Geraci, Russia Minorities and Empire,” in .docx
Please readRobert Geraci, Russia Minorities and Empire,” in .docxPlease readRobert Geraci, Russia Minorities and Empire,” in .docx
Please readRobert Geraci, Russia Minorities and Empire,” in .docx
 
Ford VS ChevroletThere are many reasons that make the Chevy.docx
Ford VS ChevroletThere are many reasons that make the Chevy.docxFord VS ChevroletThere are many reasons that make the Chevy.docx
Ford VS ChevroletThere are many reasons that make the Chevy.docx
 
Fairness and Discipline     Weve all been disciplined at one.docx
Fairness and Discipline     Weve all been disciplined at one.docxFairness and Discipline     Weve all been disciplined at one.docx
Fairness and Discipline     Weve all been disciplined at one.docx
 
Appendix 12A Statement of Cash Flows—Direct MethodLEARNING .docx
Appendix 12A Statement of Cash Flows—Direct MethodLEARNING .docxAppendix 12A Statement of Cash Flows—Direct MethodLEARNING .docx
Appendix 12A Statement of Cash Flows—Direct MethodLEARNING .docx
 
Effects of StressProvide a 1-page description of a stressful .docx
Effects of StressProvide a 1-page description of a stressful .docxEffects of StressProvide a 1-page description of a stressful .docx
Effects of StressProvide a 1-page description of a stressful .docx
 
Design Factors NotesCIO’s Office 5 People IT Chief’s Offi.docx
Design Factors NotesCIO’s Office 5 People IT Chief’s Offi.docxDesign Factors NotesCIO’s Office 5 People IT Chief’s Offi.docx
Design Factors NotesCIO’s Office 5 People IT Chief’s Offi.docx
 
Question 12.5 pointsSaveThe OSU studies concluded that le.docx
Question 12.5 pointsSaveThe OSU studies concluded that le.docxQuestion 12.5 pointsSaveThe OSU studies concluded that le.docx
Question 12.5 pointsSaveThe OSU studies concluded that le.docx
 
Case Study 1 Questions1.     What is the allocated budget .docx
Case Study 1 Questions1.     What is the allocated budget  .docxCase Study 1 Questions1.     What is the allocated budget  .docx
Case Study 1 Questions1.     What is the allocated budget .docx
 
Behavior in OrganizationsIntercultural Communications Exercise .docx
Behavior in OrganizationsIntercultural Communications Exercise .docxBehavior in OrganizationsIntercultural Communications Exercise .docx
Behavior in OrganizationsIntercultural Communications Exercise .docx
 
Discussion Question Comparison of Theories on Anxiety Disord.docx
Discussion Question Comparison of Theories on Anxiety Disord.docxDiscussion Question Comparison of Theories on Anxiety Disord.docx
Discussion Question Comparison of Theories on Anxiety Disord.docx
 
I have always liked Dustin Hoffmans style of acting, in this mov.docx
I have always liked Dustin Hoffmans style of acting, in this mov.docxI have always liked Dustin Hoffmans style of acting, in this mov.docx
I have always liked Dustin Hoffmans style of acting, in this mov.docx
 
Is obedience to the law sufficient to ensure ethical behavior Wh.docx
Is obedience to the law sufficient to ensure ethical behavior Wh.docxIs obedience to the law sufficient to ensure ethical behavior Wh.docx
Is obedience to the law sufficient to ensure ethical behavior Wh.docx
 
If you are using the Blackboard Mobile Learn IOS App, please clic.docx
If you are using the Blackboard Mobile Learn IOS App, please clic.docxIf you are using the Blackboard Mobile Learn IOS App, please clic.docx
If you are using the Blackboard Mobile Learn IOS App, please clic.docx
 
Is the proliferation of social media and communication devices a .docx
Is the proliferation of social media and communication devices a .docxIs the proliferation of social media and communication devices a .docx
Is the proliferation of social media and communication devices a .docx
 
MATH 107 FINAL EXAMINATIONMULTIPLE CHOICE1. Deter.docx
MATH 107 FINAL EXAMINATIONMULTIPLE CHOICE1. Deter.docxMATH 107 FINAL EXAMINATIONMULTIPLE CHOICE1. Deter.docx
MATH 107 FINAL EXAMINATIONMULTIPLE CHOICE1. Deter.docx
 
If the CIO is to be valued as a strategic actor, how can he bring.docx
If the CIO is to be valued as a strategic actor, how can he bring.docxIf the CIO is to be valued as a strategic actor, how can he bring.docx
If the CIO is to be valued as a strategic actor, how can he bring.docx
 
I am showing below the proof of breakeven, which is fixed costs .docx
I am showing below the proof of breakeven, which is fixed costs .docxI am showing below the proof of breakeven, which is fixed costs .docx
I am showing below the proof of breakeven, which is fixed costs .docx
 
Examine the way in which death and dying are viewed at different .docx
Examine the way in which death and dying are viewed at different .docxExamine the way in which death and dying are viewed at different .docx
Examine the way in which death and dying are viewed at different .docx
 
Karimi 1 Big Picture Blog Post ​ First Draft College .docx
Karimi 1 Big Picture Blog Post ​ First Draft College .docxKarimi 1 Big Picture Blog Post ​ First Draft College .docx
Karimi 1 Big Picture Blog Post ​ First Draft College .docx
 
Please try not to use hard words Thank youWeek 3Individual.docx
Please try not to use hard words Thank youWeek 3Individual.docxPlease try not to use hard words Thank youWeek 3Individual.docx
Please try not to use hard words Thank youWeek 3Individual.docx
 

Recently uploaded

CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 

1. Respond to other student Discussion Board providing additional

  • 1. 1. Respond to other student Discussion Board providing additional insights, feedback and/or examples as applicable. Discussion Board of another student: It is almost impossible to fully secure an online or mobile account with just password. Data breaches ,malware, device theft, and myriad other methods can be used to compromise digital passwords, no matter how secure they are. That's why anyone with sensitive information or data protected by a password needs a second method of securing their account, hence two-factor authentication ( Vigliarolo, 2020). Two-factor authentication is a supplement to a digital password that, when used properly, makes it harder for a cybercriminal to access a compromised account. Two-factor authentication is also referred to as 2FA, two-step verification, login verification, and two-step authentication. Two factor authentication goes along with a password as second form of identity verification. How this works is upon successful login into an account with password user is prompted to either confirm their identity using a one-button push with a verification app or input a random security code from a text, email, push notification, or physical key. The second factor is, ideally, harder to spoof than a password; it requires something the legitimate user has physical access to, like a smartphone with a particular authenticator app installed, a linked phone number for a push notification or SMS authentication code, or a hardware security key, which leaves a hacker stuck even if they have the correct password to the account. some form of two factor authentications are biometrics like Touch ID , authenticator apps, SMS authentication, email authentication, or a physical security key to authenticate an account with an authentication code. Each method has its pros and cons, and two-factor authentication shouldn't be relied on to be the end-all, be-all of account security. Each of those methods can be cracked by
  • 2. someone with enough knowledge or drive. SMS and email authentication, easily the most ubiquitous, are also the most easily cracked. Text messages aren't secure and can be intercepted, and email accounts can be hacked. Anyone who has spent time online knows it's a bad idea to put all their security eggs in a single basket, and two-factor authentication is no exception. Couple years ago CNET reported RSA's physical security tokens were hacked, so even systems you think are secure (like random number generators) can be exploited. The biggest security hole in two-factor authentication, and the one most often exploited is social engineering. Social engineering is essentially people hacking instead of trying to break encryption, brute-force passwords, or crack RSA tokens a social engineer goes for the path of least resistance by phishing, pretexting, phone spoofing, or otherwise lying to extract information from people who don't realize they're giving up sensitive data to a person who shouldn't have it. References : Vigliarolo, Brandon. "Two -factor authentication : A cheat Sheet" TechRepublic 11 June 2020 https://www.techrepublic.com/article/two-factor-authentication- cheat-sheet/ Respond here: 2. Responding to their Discussion Board with additional information, feedback and examples as applicable. Discussion board of another student: The term “Access Control” refers to “the control of access to system resources after a user’s account credentials and identity have been authenticated and access to the system has been
  • 3. granted.” (University of Hawai'i, 2021) Having adequate access controls are vital to ensuring the security of information held on an enterprise network from unintentional (or intentional) modification. The three types of access controls are Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC). Each of these controls has their own strengths and weaknesses, however it is important for businesses to adopt the appropriate access control model based on the needs of their employees, as well as the information protected. Discretionary Access Control (DAC) is a simplistic approach to data control, whereas the data owner decides on the permissions granted to the specific information. Under this type of control, persons that have been granted access to the information have the ability to pass the information to other individuals or objects, grant privileges to other individuals, change attributes regarding security and other characteristics, specify security attributes associated with newly-created objects, or dictate the overarching rules regarding access controls to the information. While easy to apply, this type of access control is extremely difficult to regulate due to the fluid nature of permissions granted once the data owner issues the initial access permissions. Mandatory Access Control (MAC), which improves on the weak points of DAC, is an access policy in which all individuals and objects within the technical purview of the data owner have uniform security controls applied to them. Subjects that are granted access to information are inhibited from distributing the data to unauthorized sources, granting privileges to other individuals, changing security controls, or changing the governing access control. MAC is, traditionally, the most common access control applied due to its inclusive nature. Role-Based Access Control (RBAC) is, as could be extrapolated from the name, access control based on user roles. This means that a user that receives access to data based on the assumption
  • 4. of a given role, whether explicit or implicit, is a role-based access control. This type of access control ensures that information is only accessed by personnel that require access, and any modifications are done only by authorized personnel. This also means that the data owner, while the originator of the information, may not have access to further modify the data after its inception. Security principles such as “least privilege” and “separation of privilege” are in effect in this type of access control, and play a pivotal role in ensuring the integrity of the data that it protects. The final access control, Attribute-Based Access Control, is more complicated and thus less likely to be utilized in an enterprise environment. Under this type of access control resources and users are assigned and organized by “attributes” such as time of day or position and location, and their access is based on these factors. Known as a dynamic access control, this type of control benefits critical operational information and sensitive data. If the information does not geographically move (aka a SCIF or some sort of classified facility), then ABAC can be considered as the most secure type of access control for high-priority information. All of this being said, in the end the question is not “Do I need a form access control?”, but rather “What type of access control best suits my company needs?” The secrecy and severity of information, least privilege, and geographic location will determine the needs of the organization and how read, write, modify, and delete permissions are applied. Knowing your organization and its requirements are the most important factor. Also, it is important to ensure that your company has a competent Change Management Board (CMB) and that the type of access control is evaluated upon, thoroughly tested in a sandbox environment, and implemented in a manner that supports continuity of business operations. References University of Hawai'i. (2021). Access Control Models – UHWO Cyber Security. Westoahu.hawaii.edu. Retrieved 15 November
  • 5. 2021, from https://westoahu.hawaii.edu/cyber/best- practices/best-practices-weekly-summaries/access-control/. Respond here: Running head: ANNOTATED BIBLIOGRAPHY 1 ANNOTATED BIBLIOGRAPHY 4 Week 3: Annotated Bibliography for Final Project Your Name University of Arizona Global Campus CRJ 201: Introduction to Criminal Justice Instructor's Name Month Day, Year Want to view a sample annotated bibliography? Need further help? Ctrl+Click: Annotated Bibliography Week 3: Annotated Bibliography for Final Project Author, A. (Year Published). Article title. Journal Name, Volume(Issue), page range. doi:# or Retrieved from journal’s homepage URL In the first paragraph of your annotation, summarize the main points of the source that you found to support the ideas in Case #1. This source should address the criminal justice issue of law enforcement communication in multilingual communities. In the second paragraph of your annotation, explain how the source is relevant to your Final Project. Explain how this particular source relates to the ideas discussed in Case #1.
  • 6. Explain how this source will help you develop your Final Project. Author, A. (Year Published). Article title. Journal Name, Volume(Issue), page range. doi:# or Retrieved from journal’s homepage URL In the first paragraph of your annotation, summarize the main points of the source that provides insight into how criminology may apply to a program, practice, approach, or policy relevant to a criminal justice issue in Case #1. In the second paragraph of your annotation, explain how the source is relevant to your Final Project. Explain how this particular source relates to criminology and a program, practice, approach, or policy discussed in Case #1. Explain how this source will help you develop your Final Project. Author, A. (Year Published). Article title. Journal Name, Volume(Issue), page range. doi:# or Retrieved from journal’s homepage URL In the first paragraph of your annotation, summarize the main points of the source that you found to support the ideas in Case #2. This source should be relevant to the criminal justice issue of juror exclusion by race in a criminal case. In the second paragraph of your annotation, explain how the source is relevant to your Final Project. Explain how this particular source relates to the ideas discussed in Case #2. Explain how this source will help you develop your Final Project. Author, A. (Year Published). Article title. Journal Name, Volume(Issue), page range. doi:# or Retrieved from journal’s homepage URL In the first paragraph of your annotation, summarize the main points of the source that you found to support the ideas in Case #3. This source should address the criminal justice issue of cell conditions within the context of Eighth Amendment considerations. In the second paragraph of your annotation, explain how the source is relevant to your Final Project. Explain how this
  • 7. particular source relates to the ideas discussed in Case #3. Explain how this source will help you develop your Final Project. Author, A. (Year Published). Article title. Journal Name, Volume(Issue), page range. doi:# or Retrieved from journal’s homepage URL In the first paragraph of your annotation, summarize the main points of the source that you found to support the ideas in this section of your paper. This source will address the critical perspective of the criminal justice issue that you chose, relevant to any of the three cases. In the second paragraph of your annotation, explain how the source is relevant to your Final Project. Explain how this particular source relates to a critical perspective of a criminal justice issue relevant to any of the three cases. Explain how this source will help you develop your Final Project. Tip 1: Note that references are listed in alphabetical order. Tip 2: When including a URL for an online journal, you must search for the journal’s home page and include this in your reference entry. You may not include the URL found through your university library, as readers will not have access to this library. Tip 3: Delete these “hints” (purple boxes) before turning in your final assignment.
  • 8. Need more help formatting other types of sources? Ctrl+Click: Formatting Your References