Article Writing Homework Help

Provide a 3 pages analysis while answering the following question: Information Security of Business. Prepare this assignment according to the guidelines found in the APA Style Guide. An abstract is re

Provide a 3 pages analysis while answering the following question: Information Security of Business. Prepare this assignment according to the guidelines found in the APA Style Guide. An abstract is required. Information security essentially requires that the genuine parties to a transaction are identified, the actions they are allowed to perform are determined and their actions are limited to only those that are necessary to initiate and complete the transaction. Anything beyond that means that an intrusion attack is taking place.

Get Your Custom Essay Written From Scratch
We have worked on a similar problem. If you need help click order now button and submit your assignment instructions.
Just from $13/Page
Order Now

A new technology that has come up to secure information is the use of “tokens”. A token is a form of two-factor authentication whereby the user needs a combination of something he knows for e.g. a password and something he has e.g. a token, to log on to a system. Tokens come in various shapes and sizes and they are mainly of two types. “passive tokens” are storage devices that contain a secret code that allows users to gain access to a network, whereas “active tokens” are usually small stand-alone electronic devices that generate a one-time password that is only useful for a single log-on and the user logs on to the system using this one-time password.

Currently there are 20 vendors who are involved in the marketing of these handheld devices and the price ranges from $30 to $100 per unit. Companies wanting to use this technology can choose anything that serves their need and purpose because it can be customized and costs accordingly. However, four vendors are the market leaders because their products are sold the most. three vendors have the token device the size of a small calculator with a keyboard and use a ‘challenge response’ strategy. The fourth vendor supplies a device that is the size of a credit card and operates on a random number basis.

Tokens are becoming increasingly popular among major companies today because they provide a very good and reliable solution to safeguard information. Over the years, companies have tried various means by which the network and information of the company would remain safe and not get in the wrong hands. However, more often than not, expert hackers have managed to break in and damage the whole network of companies. As a result of this, companies have faced enormous amounts of losses and experienced damages beyond repair.&nbsp.