Question

In: Computer Science

Good Day Class, Please look at my questions and post accordingly. You most likely want to...

Good Day Class,

Please look at my questions and post accordingly. You most likely want to post a few times throughout this period as you discover new concepts or programming ideas.

Discussion Topic: Describe a fake login management scenario. Identify several authentication practices. Are passwords becoming obsolete?

Solutions

Expert Solution

Fake login management scenario:

In fake login situations, the user data is stolen including login data. The attacker creates a page that looks like the genuine page and when the user fills in the details and login credentials, the data is saved in the attacker's database.

For example, a perpetrator sends an email to the project manager and asks to log in for document viewing. The link for login is sent by the attacker and when the PM logs in, the credentials are stolen by the attacker which gives full access to the network's sensitive areas.

Authentication practices:

1. Password based:

This is the most common used practice. Passwords are used in the form of numbers, letters, strings, etc. Passwords can be cracked and hence they are not considered the safest option available.

2. Multi-factors authentication:

In this method, different methods are used to identify the user and not just a password. It could be a code generation scenario or facial recognition technique. It helps by adding many layers of protection to the device or application.

3. Certificates:

In this method, digital certificates are used. The certificate shows digital identify of the user. It is used with a public key and a certification authority's signature. When the user signs in, a digital certificate is asked by the server. The credibility of the user is then decided by the server by verifying the signature of the certificate.

4. Biometric:

In this method, biological methods are used. It could be facial recognition, eye scanner, fingerprint scanner, voice identification. Different technologies are used here. The data can be compared to a person and saved in a database. This helps in controlling any kind of physical access.

5. Token based:

The user receives a token after entering the credentials. As a token, the user gets a unique encrypted character string. This is used to protect the system or application.  

Passwords becoming obsolete:

Traditional passwords are on the verge of becoming obsolete soon. This is because they are in the form of plain text and it is easy for hackers to hack them. Password credentials have their own advantages but new technology is bringing security measures in the form of biometric or other authentication methods. These methods offer more security than password schemes.


Related Solutions

Can you please give me a good question that I can present to my class on...
Can you please give me a good question that I can present to my class on Social Obedience? It has to be a question that the class can have a conversation about. Please give answer also.
Please answer the following questions, accordingly: 1. What must be the responsibility of government in an...
Please answer the following questions, accordingly: 1. What must be the responsibility of government in an economy? 2. What are the advantages? 3. What are the the disadvantages? 4. Overall, why is it imperative in Real-World terms?
This is one of the questions and answers to one of my scholarship questions, I want...
This is one of the questions and answers to one of my scholarship questions, I want help to review/edit/add to make it sound better please! 1. What is your most meaningful achievement, and how does it relate to your field of study and your future goals? The most meaningful achievement I have faced was beating cancer in March 2016 during my senior year of high school. This experience changed my view on many aspects of my life. Being in the...
In my accounting class we are being asked to post responses to what others post. I...
In my accounting class we are being asked to post responses to what others post. I need some help responding to this post. I MUST have a source to reference in my answer. Any help you can give me would be greatly appreciated.   A financial transaction is an agreement that occurs between a buyer and a seller when payment and a service or product is exchanged. The dual effect, also known as double accounting, is similar to a concept in...
Please answer the following questions: Q5 Material purchases on account would most likely be included in...
Please answer the following questions: Q5 Material purchases on account would most likely be included in which budget? a. Direct labor budget b. Selling and administrative budget c. Cash budget d. None of the above Q6 Out of the Park socks produce socks for sports fans. The socks come in two sizes: Medium and Large. Out of the Park anticipates the following sales volumes and prices for the coming period: Size Sales Volume Selling Price Medium 8,000 socks $4.00 each...
Questions: Which of the following is the type of analysis you would most likely use to...
Questions: Which of the following is the type of analysis you would most likely use to assess the impact of arbitrary changes in the discount rate? A.Sensitivity analysis B.Scenario analysis C.Both D.Neither Which of the following is the type of analysis you would most likely use to assess the impact of an economic recession? A.Sensitivity analysis B.Scenario analysis C.Both D.Neither Because most of a company's value comes from the terminal period, we do not have to worry too much about...
You can choose anything you want. Please do fast you can. Please provide an original post...
You can choose anything you want. Please do fast you can. Please provide an original post AND please reply to at least one classmate's post around one of the topics from this week, explaining a topic to the class, discussing a problem that you found particularly difficult, or expanding on something that you learned. To get full points you should have a thoughtful topic or response. You must complete both parts to get full credit. Please see below for an...
Can someone look into my code and tell me what do you think: Thats Palindrome; //class...
Can someone look into my code and tell me what do you think: Thats Palindrome; //class name Palindrome public class Palindrome {    public static void palindromeChecker(String... str) {        // takes string one by one        for (String s : str) {            // creates a stringbuilder for s            StringBuilder sb = new StringBuilder(s);            // reverses the sb            sb.reverse();            // checks if both...
deshiscence is most likely to occur how many days post-operatively?
deshiscence is most likely to occur how many days post-operatively?
I would like to have a response on this form or post for my psychology class....
I would like to have a response on this form or post for my psychology class. My paper will examine Autism throughout the lifespan. Specifically I am trying to determine if there is a time throughout one's lifetime where techniques to 'treat' an Autism disorder are most effective. While there are many symptoms of Autism including social, cognitive and even psychological 'deficiencies' compared to an individual without autism, I am only looking at treating the individuals cognitions, or at least...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT