RESPOND TO TIS STUDENT 50-100 WORDS

Authentication and Authorization are of the primary information security areas. Authentication is to confirm who you are. Making sure you are the person that should be accessing this information. Authorization is having access to the information at hand. Normally you have authentication and authorization through a program. For example your on line banking. On line banking requires you to have authenticity and authorization to gain access to your account. Without this information you are not allowed to gain access to your banking information. Preventing and Resistance is preventing someone from having access to important information. One example I can think of is my work email. When ever we get an email from an outside source our “Firewall” blocks the email, alerts us that this is an email outside of our company, and cautions us to open with care. Meaning be careful of this email, it’s foreign to our system. Theirs so many ways your personal information can be breached within the world of internet. One way is called cyber-terrorism, cyber-terrorism is when someone tries to intimidate you via a computer. The best way to prevent this type of issue is through detection and response. The best example I could think of is “Facebook”. I have had a FB account for several years, and it amazes me how I have been hacked so many times with individuals using my page to create false pages. Attempting to portray that they are me. How I make sure no one is using my information to create a new page, every now and again I would reach out to all of my friends on FB and let them know, “please do not accept any new friend request from me without confirming with me first.This may not completely prevent people from stealing your info, but it’s a start. At present, contractual obligations and laws that prohibit hacking, such as the Computer Fraud and Abuse Act and the Digital Millennium Copyright Act, are adopting a strict liability approach, which criminalizes almost any form of hacking, regardless of motivation or potential benefits (Kilovalty, 2019).

Kilovalty, I. (2019). Freedom to Hack. Ohio State Law Journal, 80(3), 455–520. Retrieved from http://search.ebscohost.com/login.aspx?direct=true…