Sei sulla pagina 1di 3

Authentication can be implemented in various ways within the Access Control Domain.

Authentication is the process of identifying the user to make sure they are who they are and if they should be capable of having access. There are several different methods of authentication that can be used in the Access control Domain, the basic being the User name and Password. The different forms of authentication are in terms of proof which are something that is known by the user to prove their identity like a pin, something the user has to prove their identity like a smart card, or something that the users has to prove their identity like a biometric.

The computer world contains threats; these threats can and will come in many different forms and affect not only a persons digital life but their real life as wel l. Viruses are one these said common threats, viruses infect a system and is capable of copying itself to a program. Viruses are created to steal, alter, and destroy data; some are created as a test run. Worms are a type of virus that is malicious code that acts on their own. A Worms purposes are created to not just infect on system but to move on through a network to infect every computer connected and even spread through others via the internet.

Trojans are a created virus that is hidden code within a legitimate program. Once this program is launched this releases the Trojan into the system, sometimes the legitimate file does not need to be accessed for the Trojan to be initiated. Logic bombs are code that are planted in a system or network that are inactive until a specific condition or event happen, something like shutting down the computer or opening a specific window. Logic bombs also can be activated when a timed event happened, for

example its set to activate on September 25, 2012 when the date hits the logic bomb will explode.

The OSI model is composed of seven different layers; each layer plays a different role. The seventh layer of the OSI model is the application layer, this layer uses the protocols of TELNET, HTTP, and FTP, this layer operates with the applications run by the computer such as a web browser. The sixth layer is the presentation layer which is the data that is in a format which is in accordance to the application layer which can be GIF, JPEG, MP3, DOC, and various other data formats.

The session layer which is the fifth layer deals with the end to end communication between the two hosts which communication has been established. The fourth layer, which is the transport layer prepares and converts data from the previous layers for its travel through cyberspace to the user on the other end. The third layer which is the network layer turns data from the transport layer into packets and chooses the routes each packet will be transported to the end host.

The data link layer brings up the second layer, which takes the packets from the network and puts them back in the proper order before sending them to the physical layer. This layer will also send a request to the sending for any lost or dropped packets to be replaced. The physical layer deals with all the physical aspects of the network, including wires, electricity and data passed through the wires, the Ethernets, and computers, servers, modems, routers, printers connected to them.

Reference

Webopedia (2010) The 7 layers of the OSI model retrieved August 10, 2012 from
http://www.webopedia.com/quick_ref/OSI_Layers.asp

Iverson E (2009) Malicious Attacks most Blamed in 09 retrieved August 10, 2012 from http://voices.washingtonpost.com/securityfix/2009/06/malicious_attacks_blamed_for_m.html

Potrebbero piacerti anche