Question

Why is it important to verify the identity of computer users? What are three authentication strategies? Which is the strongest form of authentication? Which is the weakest? What credentials does your university use to verify your identity for access to e-mail and other web-based information such as personal financial aid information and online course materials? Is this strong or weak authentication? What is a security token? Visit Wikipedia.org to learn how security tokens are used to authenticate users and prepare a brief report of your findings. Do you think it is a good idea to use security tokens to authenticate students? Why or why not?



$1.99
Sales0
Views130
Comments0
  • CreatedJanuary 03, 2015
  • Files Included
Post your question
5000