Question

In: Computer Science

Question 1: Explain the authentication factor, and the combination of those factors, to achieve appropriate security...

Question 1:
Explain the authentication factor, and the combination of those factors, to achieve appropriate security on information
( should be indicating the authentication factors and example of using a combination of those factors ).

Solutions

Expert Solution

An authentication factor is a category of credential that is intended to verify, sometimes in combination with other factors, that an entity involved in some kind of communication or requesting access to some system is who, or what, they are declared to be.

Each category is considered a factor. For example, user names and passwords are both the same type of factor, so their combined use is single-factor authentication (SFA), despite the fact that there are two elements involved.

Types of authentication factors:
There are three categories of authentication factors. These are generally broken down as:

  • Knowledge factors: A knowledge factor is something you know, such as a user name and password.
  • Possession factors: A possession factor is something you have, such as a smart card or a security token.
  • Inherence factors: An inherence factor is something you are, an inherent biometric characteristic such as a fingerprint, voice or iris pattern.

Single-factor authentication is based on only one category. The most common SFA method is a user name and password combination (something you know), although biometric authentication is becoming more common. The security of SFA relies to some extent upon the diligence of users. Best practices for SFA include selecting strong passwords and refraining from automatic or social logins. Nevertheless, for any system or network that contains sensitive data, it's important to add additional authentication factors. Multifactor authentication (MFA) involves two or more independent credentials for more secure transactions.

Two-factor authentication uses any two the three categories. Examples include using a security token, such as a key fob or smart card, in conjunction with a PIN (personal identification number) or swiping a card before scanning your fingerprint.

Three-factor authentication requires the use of credentials from each of the three categories. One example would be entering a PIN (something you know) to unlock your smartphone (something you have) and then supplying an iris scan to finalize authentication.

Hope it helps!!


Related Solutions

subject : Digital Security Explain AWS Multi-Factor Authentication ? please with reference type MLA i need...
subject : Digital Security Explain AWS Multi-Factor Authentication ? please with reference type MLA i need to 1 . Title  2. Authors 3. publication date 4. Journal  5. Volume
1.Is there evidence of multicollinearity? Perform Factor analysis by extracting four factors and name for those...
1.Is there evidence of multicollinearity? Perform Factor analysis by extracting four factors and name for those factors. Problem needs to solved using R ID ProdQual Ecom TechSup CompRes Advertising ProdLine SalesFImage ComPricing WartyClaim OrdBilling DelSpeed Satisfaction 1 8.5 3.9 2.5 5.9 4.8 4.9 6 6.8 4.7 5 3.7 8.2 2 8.2 2.7 5.1 7.2 3.4 7.9 3.1 5.3 5.5 3.9 4.9 5.7 3 9.2 3.4 5.6 5.6 5.4 7.4 5.8 4.5 6.2 5.4 4.5 8.9 4 6.4 3.3 7 3.7...
Suppose a three-factor model is appropriate to describe the returns of a stock. Information about those...
Suppose a three-factor model is appropriate to describe the returns of a stock. Information about those three factors is presented in the following chart:      Factor β Expected Value Actual Value   GDP .0008021 $14,161    $14,142        Inflation −.85 3.4% 3.2%   Interest rates −.42 6.2% 6.0%    a. What is the systematic risk of the stock return? (A negative answer should be indicated by a negative sign. Do not round intermediate calculations and enter your answer as a percent rounded...
Suppose a three-factor model is appropriate to describe the returns of a stock. Information about those...
Suppose a three-factor model is appropriate to describe the returns of a stock. Information about those three factors is presented in the following chart:      Factor β Expected Value Actual Value   GDP .0007421 $14,086    $14,062        Inflation −.95 2.9% 2.7%   Interest rates −.37 5.2% 5.0%    a. What is the systematic risk of the stock return? (A negative answer should be indicated by a negative sign. Do not round intermediate calculations and enter your answer as a percent rounded...
Suppose a three-factor model is appropriate to describe the returns of a stock. Information about those...
Suppose a three-factor model is appropriate to describe the returns of a stock. Information about those three factors is presented in the following chart:   Factor β Expected Value Actual Value   GDP .0007781 $14,131    $14,110        Inflation −.98 3.2% 3.0%   Interest rates −.40 5.8% 5.6% a. What is the systematic risk of the stock return? (A negative answer should be indicated by a negative sign. Do not round intermediate calculations and enter your answer as a percent rounded to 2...
Identify ALL of the factors that are significant at a level of 1%. Factor A Factor...
Identify ALL of the factors that are significant at a level of 1%. Factor A Factor B Factor C Factor D Factor E Factor F Result 130 120.3 125 58.4 110 106.7 2336.8 125.4 93 147.5 145.4 109.5 103.8 2631.1 89.1 78.6 73.9 101.4 59.1 104.5 1788.3 139 56.5 85 143 101.8 99.2 1881 115.9 112 105.6 94.5 133.4 82.7 2182.1 148.6 145.8 83.8 122.6 125.7 130.3 2390.4 140.1 69.5 97.6 53.2 87.5 116.1 1823 67.9 103.1 130.8 67.6 141...
Question 2: (A) Marketing Environment is the combination of external and internal factors and forces which...
Question 2: (A) Marketing Environment is the combination of external and internal factors and forces which affect the company’s ability to establish a relationship and serve its customers. How the Marketing environmental influences and affect the business located in the UAE country. Explain in your own word with an example? (5 Marks, Word Limit 200-350) (B) Together partnership firm producing and selling different high quality daily necessary goods like milk products, fancy products, soft drinks etc. at high price compared...
Explain the Implications of the CAPM.           Explain the Security Market Line (SML). Explain the Two-Factor...
Explain the Implications of the CAPM.           Explain the Security Market Line (SML). Explain the Two-Factor model by Merton.
In one or two paragraphs, answer the following questions: (1) How multi-factor authentication can reduce the...
In one or two paragraphs, answer the following questions: (1) How multi-factor authentication can reduce the risks of security breach? (2) Identify one or two risks of multi-factor authentication.
Explain why IEEE802.1X Link layer Security with a RADIUS server is not enough to achieve the...
Explain why IEEE802.1X Link layer Security with a RADIUS server is not enough to achieve the desired goals of the IT Team in this case study.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT