Question

In: Computer Science

19. Explain two factor authentication and provide at least two examples of how this authentication method...

19. Explain two factor authentication and provide at least two examples of how this authentication method can be implemented.

20. How is ethics different from law? Explain in detail, please!

Solutions

Expert Solution

19. Two factor authentication or we can say two factor verification is a process which provides extra security by asking user for two different authentication factors to verify themselves. In first verification factor, user enters username and password and the second verification factor could be either of the following :

a. Something you are : This includes verification like iris scan, fingerprint or voice print.

b. Something you have : Thins includes something that user have like credit card or a hardware token.

c. Something you know : This includes PIN numbers, passwords or secret questions.

Examples of Two Factor Authentication

1. When you go to an ATM , you need to have a debit card and you should know the correct PIN number in order to withdraw money from ATM as only the correct combination of both these things will allow you to withdraw money.

2. In Apple iOS devies, Face ID helps to log in to your devices and in Android, the similar function is done by face unlock feature. If the face detection is not approved or fails, then you are asked to enter a passcode or pin in order to log in to the device. Hence in these devices, there is Two Factor Authentication.

20. Ethics and laws are different things. Ethics guides us the best things we can adopt or do in various different aspects of life while on the other hand, laws provides specific rules for the smooth maintenance of societies and their institutions. The main difference between these two is that ethics provides the maximum standards while laws provides the minimum. There maybe many things which are legal in the eyes of laws but they are not acceptable in the eyes of ethics or something that seems to be correct but is illegal. You may find laws expressed and published in writing but ethics are not written anywhere. They are abstract. For violating any law, the person is given the punishment based on the law he/she violated but no punishment is there for violation of ethics. Laws are made for the peace and protection of citizens whereas ethics are there to make the people decide what is right or wrong, acceptable or unacceptable and how to act.


Related Solutions

1. Explain how IPv4 route decisions are made. Provide at least two examples. 2. Review an...
1. Explain how IPv4 route decisions are made. Provide at least two examples. 2. Review an IPv4 header and discuss the different fields and what each field does. 3. Compare and contrast the major differences between IPv4 and IPv6. Your write-up should include the following details: Header details Datagram size How decisions are made How addresses are assigned
Explain the various categories of ratio analysis and provide examples of at least two ratios in...
Explain the various categories of ratio analysis and provide examples of at least two ratios in each category. If you were an investor, which category would you be most interested in? Why?
Provide at least two examples of social or service groups and explain their involvement in community...
Provide at least two examples of social or service groups and explain their involvement in community health.
What is a business method patent? Provide examples of business method patents and explain how having...
What is a business method patent? Provide examples of business method patents and explain how having such a patent can provide a firm a competitive advantage in the marketplace .What are some examples of intangible assets? How can an intangible asset create value for an organization? Explain in detail.
This is for CYBER SECURITY 1)What are the 3 factors of Authentication and provide at least...
This is for CYBER SECURITY 1)What are the 3 factors of Authentication and provide at least 3 examples for each? 2) Please compare and contrast the following 4 Access Control Models and let me know how they work and give me an example of each. 1. Discretionary Access Control 2. Mandatory Access Control 3. Rule Based Access Controls 4. Role Based Access Controls
1. How does TLS provide authentication? Does it provide mutual authentication (both client and server-side)? Is...
1. How does TLS provide authentication? Does it provide mutual authentication (both client and server-side)? Is that required? 2.What is the purpose of padding, Message Authentication Code (MAC), handshake protocol, change cyber suite (CCS) protocol? 3.How does TLS provide: confidentiality, availability, integrity, non-repudiation?
Provide/explain at least two clear examples in which health provider has information that is unavailable to...
Provide/explain at least two clear examples in which health provider has information that is unavailable to health consumer. What is reputation good (provide one example for health care)?
How does two factor authentication work and why is it better than just passwords? Detailed answer...
How does two factor authentication work and why is it better than just passwords? Detailed answer please.
In one or two paragraphs, answer the following questions: (1) How multi-factor authentication can reduce the...
In one or two paragraphs, answer the following questions: (1) How multi-factor authentication can reduce the risks of security breach? (2) Identify one or two risks of multi-factor authentication.
Question 3: What is Function? Explain with examples. Provide at least 2 program examples.
Question 3: What is Function? Explain with examples. Provide at least 2 program examples.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT