Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Task Performance

in
Information Security and
Management

Submitted by:
Rovelyn B. Cabico
BSAIS401A

Submitted to:
Sir. Mark Binuya

January 23, 2023


a. Identify and describe two (2) authentication processes or features being
implemented on the website.
The first one is that I need to enter my email and password to ensure that I
own the elms account that I am opening. By entering the right password
my account will open but when someone is accessing without my
permission as this person know my email which is only our student
number which is present in some of our attendance form my Elms account
won’t let the person accessing to access my account.
The second authentication process that I encounter us the device
identification. When my elms account is open to another device and I’m
going to open it with another one I will receive a notification in my screen
that my elms account is currently logged in to another device that is why I
can’t login.

b. Are these authentication processes or features important? Why or why not? 


Yes, this is for protecting our account from malicious intent and use it
without our consent. Authentication process promote data privacy which
protect the private information of user and help them secure their data and
avoid it from leaking. Authentication process is one most important in IT
and critically address as it is the security of every device, emails, and
software that we are currently using.

c. Are these authentication processes or features enough to secure the website?


Why or why not? 
It provides security yes, but it is not enough as the technology continue to
innovate the risk also elevate. Example is that although we have password
our account is still being access by hacker as they know how to get
through with the system and break it. In banks they can access our account
just by clicking emails that they delivered and when we are not aware in
this kind of threat, we are not able to avoid it.
d. What other authentication process or feature would you suggest reinforcing
the security of the website? Rationalize your answer. 
I would suggest the biometrics as it can’t be copy or just access by anyone
because you need the person physical in order to have access in their
biometrics. Without the owner biometrics you are not able to open or
access their account and information. It is already being implement by
other software and it adds up security in their account which aside from
password the biometrics is helping them secure their information. As the
technology evolved security is also address in order to improve security
and provide user a better service when it come to data privacy and
security. Different industry is using the technology and all of them secure
their data in data base and rely to the security that these technologies offer
to them.
e. In your perspective, does the website follow the golden rules of netiquette?
Justify your answer. 
Yes, as it ensures that our data is safe in our account. The document that we
submitted is being handle with security where it is not being uploaded to some
website without our consent. The file that we upload in our elms account is
secured and as our teachers protect our privacy and make sure that our file is kept
and not being used by another user. That is why we have our password to ensure
that no one can use our account without our consent but still with the website
security provide a bigger role to secure our data and not leak in public.

You might also like