This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: TECH 7350 Managing Information Security The Graduate School of Management at the University of Dallas TECH 7350 MANAGING INFORMATION MANAGING INFORMATION SECURITY SECURITY Sandra Blanke, Ph.D., CISSP The Graduate School of Management at the University of Dallas Unit 3 Chapter 4 Unit 3 Chapter 4 Controlling Access with Authorization Controlling Access with Authorization Part 3 of 5 Part 3 of 5 2 Access Control Pass-phrase A sequence of characters longer than a password More secure than a password Harder to obtain by a hacker Takes longer to enter into the system Memory Cards Holds but does not process information Requires the reader to process the information Holds a user authentication information so the user only keys in the PIN ( ATM card swipe and key in PIN) Smart Cards Microprocessor and integrated circuits built into the card Has the necessary H/W and S/W to process the information User enters a PIN to unlock the smart card The information held on the smart card is not readable until the correct PIN...
View Full Document
- Spring '11