Question

In: Computer Science

Authentication and Access Controls Security enhancements designed to require users to present two or more pieces...

Authentication and Access Controls

Security enhancements designed to require users to present two or more pieces of evidence or credentials when logging into an account is called multi-factor authentication.

  • Legislation and regulations such as The Payment Card Industry (PCI) Data Security Standard requires the use of MFAs for all network access to a Card Data Environment (CDE).
  • Security administrators should have a comprehensive understanding of the basic underlying principles of how MFA works.

1. Define all four factors of multifactor authentication and give examples of each:

  • Factor 1
  • Factor 2
  • Factor 3
  • Factor 4

2. True or False: A password and pin is an example of 2-factor authentication.

3. True or False: A password and google authenticator app is an example of 2-factor authentication.

4. What is a constrained user interface?

Solutions

Expert Solution

Multifactor Authentication:

These days, the terms “Multi-Factor Authentication”, “Two-Factor Authentication” or “Dual-Factor Authentication” are getting to be increasingly common. You likely relate multi-factor authentication with joining a username or e-mail, a secret word and a token which terminates after 30 seconds. But is it truly fair that?

  After you claim to be someone, you would like to supply encourage information to demonstrate that you just are that fact you command you are. For occasion, assume simply go to an ATM and utilize your credit card. After the card is embedded into the machine, it'll be utilized to declare an specification. Presently, how does the ATM know that whoever is in ownership of the card is the proprietor of the card? It knows it by inquiring something that as it were the proprietor would be able to supply! That may be a secret word, a unique mark or a 6–8 digit code which terminates after a certain number of seconds. These are all diverse sorts of data which are utilized for verification purposes — they are components of verification.

Factor 1: An data is grouped as being you see on the off chance that you store it in your memory and can recover it when required. For occurrence, a password, an reply to a security address or a Individual Recognizable proof Number (Stick). Presently, you might say: “but in the event that the secret word is 40-characters long, I won’t keep in mind it!”. That's genuine, to an degree. In any case long a password may be, you'll always memorize it. I concur that memorizing passwords these days isn't prudent that is you ought to truly utilize a Secret word Director but it is individual that can be done.

Factor 2: This calculate alludes to data that you simply can (physically) take with you. For illustration, some time recently you send cash to somebody, numerous banks will inquire you for a token (too alluded to as one-time password and more often than not 6–8 digits long) that terminates either after to begin with utilize or after 30 seconds. The token is more often than not produced by a gadget such as the RSA SecurID (or contingent on the bank, they power offer a portable application which produces the token)

There are two open benchmarks for creating these tokens: HMAC-based One-Time Password (HOTP) and Time-based One-Time Password (TOTP). Basically, HOTP creates a token which does not terminate until the client employments it for the primary time (after which a new token will ought to be created). TOTP creates a token each 30 seconds. In the event that a client does not utilize it inside 30 seconds, a unused token will be naturally generated. Tokens are not indexed as being you know since, well, you don’t notice the token up to you really watch tha

Factor3: I am beyond any doubt you're commonplace with this one: digital signature . That is to say, being you're is an data that's in you — it’s a characteristic that as it were you and no one else has it. That incorporates, but isn't constrained to, your unique finger impression or thumbprint, palm, handprint, retina, iris, voice and confront is an data that's in you — it’s a characteristic that as it were you and no one else has it. That incorporates, but isn't constrained to, your unique finger impression or thumbprint, palm, handprint, retina, iris, voice and confront.

Factor 4: This calculate might not be as known as the ones as of now specified. Some place you're is related to your area. One of the foremost common strategies of identifying a user’s area is by means of Internet Protocol (IP) addresses. For occurrence, assume simply utilize a service which has Geolocation security checks. Once you design your account, you might say simply live within the Joined USA. In case somebody tries to log in to your account from an IP address found in FRANCE, the benefit will likely inform you saying that a login endeavor was made from a area distinctive than yours. That's greatly valuable to secure your account against programmers.

2) password and pin is an example of 2-factor authentication. - Flase

  Verification variables classically drop into three categories: Information components incorporate things a client must know in arrange to log in: Client names, IDs, passwords and individual recognizable proof numbers (PINs) all drop into this category. So this example is 3-factor authentication.

3) True or False: A password and google authenticator app is an example of 2-factor authentication. - True

  Google Authenticator may be a portable security application based on two-factor confirmation (2FA) that makes a difference to confirm client characters some time recently allowing them get to to websites and administrations.

4) constrained user interface:

The proper reaction is confines client get to capacities by as it were permitting the client to ask certain capacities or have get to particular framework assets. Obliged client interface limits the clients environment inside the framework and get to objects.


Related Solutions

Authentication controls can be used to verify the identity of the person attempting to access an...
Authentication controls can be used to verify the identity of the person attempting to access an AIS. Identify the different types of authentication controls, the problems related to each control and how they can be used to provide effective protection from unauthorised access to an AIS.
ACCESS CONTROLS Security Policies / Enterprise Security Strategy Plan Instructions: In NO LESS than 200 words,...
ACCESS CONTROLS Security Policies / Enterprise Security Strategy Plan Instructions: In NO LESS than 200 words, answer the following question. Create an outline that could serve as a template for creating future security policies for an IT Network's Access Controls. Your template should reflect 2–3 key parts of a security policy related to intranet operations. For each element you include in your outline template, give two sentences describing the information that should be included. It is acceptable if you want...
1. T/F. Under non-discretionary access control, a third-party security administrator determines what users have access to...
1. T/F. Under non-discretionary access control, a third-party security administrator determines what users have access to certain network and system resources. 2. T/F. When establishing firewall rules, the most prudent configuration is to implicitly deny by blocking all traffic by default then rely on business need and justification to create new rules as exceptions. 3. T/F. By default, all virtual private network (VPN) client software encrypts network traffic. 4. T/F. Asymmetric encryption is more secure than symmetric encryption.
Principles of Information Security Using about 1000 words Explain in detail discretionary access controls (DACs) and...
Principles of Information Security Using about 1000 words Explain in detail discretionary access controls (DACs) and nondiscretionary access controls (NDACs)
Your company Beta has some users, hosts, and data that require high-level of security protection
Your company Beta has some users, hosts, and data that require high-level of security protection, while some users, hosts, and data that don’t need high-level security protection, just need to prevent outsider to access their data. How will you design your system to accommodate both types of users, hosts, and data. Describe how you will design the cloud
Name two main types of access control methods in a security system. Sub-categorize each of them...
Name two main types of access control methods in a security system. Sub-categorize each of them separately by four sub-types. For each main type access control methods you named, compare and contrast the four sub-types you have listed. Use tables to present their respective advantages and disadvantages. Based on your discussion in earlier parts or otherwise, propose access control(s) system for a domestic airport terminal building.
NET PRESENT VALUE Simon company is considering two investments, Project A an Project B. They require...
NET PRESENT VALUE Simon company is considering two investments, Project A an Project B. They require a 9% return from investments. The initial investment for project A is $250,000. The initial investment for project B is $525,000. The expected cash flows from each project are below. a. Compute the NPV (Net Present Value) for each project. b. Compute the profitability index for for each project. c. Which project do you recommend? Year Project A Project B 1 115,000 170,000 2...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT