(2006)Modeling an intelligent authentication system to protect financial information(Discussion).pdfVIP
- 1
- 0
- 约7.55千字
- 约 3页
- 2018-01-31 发布于浙江
- 举报
International Journal of Accounting Information Systems
7 (2006) 110 – 112
Discussion
Modeling an intelligent authentication system to protect
financial information
R.P. Sundarraj
Department of Management Sciences, 200 University Avenue West, Waterloo, Canada N2L 3G1
Received 15 November 2005; received in revised form 1 March 2006; accepted 8 March 2006
Security is a serious issue that is negatively impacting the usage of the Internet today. As
pointed out by the authors, a significant portion of companies experiences intrusion of some sort
or the other. This problem is further exacerbated when people use mobile devices and when they
conduct Internet transactions that involve financial information. This context raises the need for
authenticating users beyond their first point of entry, and thereby motivates this paper.
The paper first describes a framework for the provision of continuous authentication, and then
outlines swarm optimization as a potential technological solution for this authentication.
1. Strengths
1.1. Security framework
After a review of the state of current authentication systems and showing the static nature of
such systems, the authors provide the groundwork for continuous authentication. They rightly
make clear that even in its most rigorous form, static authentication only validates an entitys
identity at the time of access-request. What is, however, desirable today is to ensure that the person
who started to use the system is the one who is actually continuing to use it at every point in time.
Another notable point presented by the authors is the fact that a significant portion of the
intrusions in an organization take place from within. In other words,
您可能关注的文档
- (2005)Audit and Control:Implications of XBRL.pdf
- (2005)Auditing after SOX:Some Tips from the Front Lines.pdf
- (2005)Auditing Headaches?Relieve Them with CAR.pdf
- (2005)Auditor Identification of Fraud Risk Factors and their Impact on Audit Programs.pdf
- (2005)Auditors' Perception of Fraud Risk Indicators:Malaysian Evidence.pdf
- (2005)Cases in Strategic-Systems Auditing.pdf
- (2005)Continuous Auditing ≠ Continuous Assurance.pdf
- (2005)Continuous Auditing in the Shadow of SOX:Re-Engineering Interim Reporting and Assurance.pdf
- (2005)Continuous Auditing:An Operational Model for Internal Auditors(ExecSumm).pdf
- (2005)Continuous Auditing:Implications for Assurance, Monitoring, and Risk Assessment(ACL).pdf
- (2006)Modeling an intelligent continuous authentication system to protect financial information resources.pdf
- (2006)Protecting Personal Information in Continuous Control Monitoring and Continuous Audit Environments.pdf
- (2006)Sarbanes-Oxley compliance, internal control and ERP Systems:Automation and the case of mySAP ERP.pdf
- (2006)Managing Perceptions of Technical Competence:How Well Do Auditors Know How Others View Them?.pdf
- (2006)Real time information for the pervasive enterprise.pdf
- (2006)Second-Wave Benefits of XBRL.pdf
- (2006)state_internal_audit_profession_study_06.pdf
- (2006)technology's impact on auditing.pdf
- (2006)Ten Questions for Your Auditor.pdf
- (2006)The Case for Continuous Auditing.doc
原创力文档

文档评论(0)