This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: TECH 7350 – Managing Information Security The Graduate School of Management at the University of Dallas TECH 7350 MANAGING INFORMATION MANAGING INFORMATION SECURITY SECURITY Sandra Blanke, Ph.D., CISSP The Graduate School of Management at the University of Dallas Unit 3 Chapter 4 Unit 3 Chapter 4 Controlling Access with Authorization Controlling Access with Authorization Part 3 of 5 Part 3 of 5 2 Access Control ¡ Pass-phrase ¢ A sequence of characters longer than a password ¢ More secure than a password ¢ Harder to obtain by a hacker ¢ Takes longer to enter into the system ¡ Memory Cards ¢ Holds but does not process information ¢ Requires the reader to process the information ¢ Holds a user authentication information so the user only keys in the PIN ( ATM card – swipe and key in PIN) ¡ Smart Cards ¢ Microprocessor and integrated circuits built into the card ¢ Has the necessary H/W and S/W to process the information ¢ User enters a PIN to unlock the smart card ¢ The information held on the smart card is not readable until the correct PIN...
View Full Document
- Spring '11
- smart card, Graduate School of Management, Sandra Blanke