Article Review on Authentication and Information Security

Article Review: Authentication and Information Security

The ubiquitous nature of computing and networking has significantly increased the probability and occurrences of security threats to information. However, the task of ensuring information security is not confined to organizations. The government and private sector have a role to play in ensuring that the country’s information security infrastructures are protected. Some of the human errors implicated in information insecurity include ignorance, input errors, failure to follow laid down procedures and configuration errors among others. The present study focuses on the role of human error in information insecurity with special emphasis on password authentication. The study established that the ability to remember passwords reduced with the number of passwords and their complexity. Consequently, such individuals were more likely to write them down or use familiar letters, symbols and numbers that are familiar. The research established that human errors that compromise information include inadequate awareness and training, time pressures and work overload and unaccountability by users. The study however established that such human errors can be overcome by using data that bear meaning to the user but still meets the required information security standards. Other mitigation measures identified in the research include institution of well-defined security policy, proper user training and accountability guidelines and system automation among others (Carstens, McCauley-Bell, Malone & DeMara, 2004).

The primary objective of having network or computer security is preventing unauthorized access and ensuring that system resources are available to permitted parties. Personally and professionally, I have used a two-factor authentication involving the use access card and fingerprint reader. I also fingerprint reader to unlock my laptop and mobile phone. I also use one-factor authentication, such as passwords in a daily basis to access my email and social media accounts (Matyáš & Říha, 2010). I also use passwords to protect and access my personal computer and laptop and the various files and folders. Additionally, I have also used lock combination to secure information. This article equipped with important skills on how I can avoid some of the commonest errors in information security and how to effectively use password authentication.

 

References

Carstens, D. S., McCauley-Bell, P. R., Malone, L. C. & DeMara, R. F. (2004). Evaluation of the human impact of password authentication practices on information security. Informing Science Journal, 7; pp. 67 – 85.

Matyáš, V. & Říha, Z. (2010). Security of biometric authentication systems. In Computer Information Systems and Industrial Management Applications (CISIM), 2010 International Conference on (pp. 19-28). IEEE.