Many institutions and businesses invest large sums of money to create and ensure a secure computer system for all its stakeholders. Outlays of monies bring together hardware, software, policies, procedures, physical parameters, and training to construct a fortress of protection for its data, network, and, ultimately, its mission. Without the sense and assumption of a secure computer network, revenues would be lost, data compromised, and secrets unfolded.
But every system relies on the identification and authentication of the user. The system would not have been built if not for the intention of users to access and use the system, whatever that system may offer to the users. Almost always is a user accessing the system from a remote area away from the system’s administrators. They need to have a way to identify each user and authenticate that the user’s digital identity matches the physical user sitting in front of the computer or server is mandatory. Add to this drama that the user is human. This very nature is what may bring down and create the weakest link in the strongest fortress. As Schneier (2000) stated, "Think of security… as a chain. The security of the entire system is only as strong as the weakest link." That weakest link is many times the user of the system; unlike the human in the food chain, where a man takes a prominent stand, in the access and security of computer networks, the human is many times the weak prey or entry point to what is secure with the assumption that the right users are identified and authenticated.
|June 8, 2022 (Wednesday)||09:30 AM - 04:30 PM|
|June 22, 2022 (Wednesday)||09:30 AM - 04:30 PM|
|July 6, 2022 (Wednesday)||09:30 AM - 04:30 PM|
|July 20, 2022 (Wednesday)||09:30 AM - 04:30 PM|
|August 3, 2022 (Wednesday)||09:30 AM - 04:30 PM|
|August 17, 2022 (Wednesday)||09:30 AM - 04:30 PM|
Let us know how we can help you.