unit_3_p3_tech_7350_c4 - TECH 7350 – Managing Information...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: TECH 7350 – Managing Information Security The Graduate School of Management at the University of Dallas TECH 7350 MANAGING INFORMATION MANAGING INFORMATION SECURITY SECURITY Sandra Blanke, Ph.D., CISSP The Graduate School of Management at the University of Dallas Unit 3 Chapter 4 Unit 3 Chapter 4 Controlling Access with Authorization Controlling Access with Authorization Part 3 of 5 Part 3 of 5 2 Access Control ¡ Pass-phrase ¢ A sequence of characters longer than a password ¢ More secure than a password ¢ Harder to obtain by a hacker ¢ Takes longer to enter into the system ¡ Memory Cards ¢ Holds but does not process information ¢ Requires the reader to process the information ¢ Holds a user authentication information so the user only keys in the PIN ( ATM card – swipe and key in PIN) ¡ Smart Cards ¢ Microprocessor and integrated circuits built into the card ¢ Has the necessary H/W and S/W to process the information ¢ User enters a PIN to unlock the smart card ¢ The information held on the smart card is not readable until the correct PIN...
View Full Document

Page1 / 4

unit_3_p3_tech_7350_c4 - TECH 7350 – Managing Information...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online