Why is it important to verify the identity of computer users? What are three authentication strategies? Which is the strongest form of authentication? Which is the weakest? What credentials does your university use to verify your identity for access to e-mail and other web-based information such as personal financial aid information and online course materials? Is this strong or weak authentication? What is a security token? Visit to learn how security tokens are used to authenticate users and prepare a brief report of your findings. Do you think it is a good idea to use security tokens to authenticate students? Why or why not?

  • CreatedJanuary 03, 2015
  • Files Included
Post your question