Question: Authentication Network and application managers need to know who is accessing their systems to determine appropriate access levels. Typically, they require that users create secret
• Users often forget complicated or frequently changing passwords, resulting in frequent calls to a help desk. The help-desk employee then faces the burden of identifying the employee by some other means and resetting the password. This process takes time and is subject to social engineering.
• Users may write down their passwords. However, this leaves passwords subject to discovery and theft.
• Users often pick the same password for many different accounts, which means that someone who discovers one of these passwords then has the “keys” to all the accounts.
• Users may pick an easy-to-remember password, which is easy to anticipate and therefore easy to guess. Password-cracking programs cycle through entire dictionaries of English language words and common word/number combinations such as “smart1” or “2smart4U.”
• Users may give away their passwords over the phone (social engineering) or via e-mail (phishing, a type of social engineering) to individuals representing themselves as a system administrator. Perhaps you have already received e-mails purportedly from a financial institution claiming identity or account difficulties and asking you to “reconfirm” your account information on their authentic-looking Web site. As you can see, using passwords to identify a person is fraught with problems. Here are some alternatives to explore. Look up each authentication approach listed below on the Internet, describe the method in your own words (be sure to cite your sources), and briefly list the advantages and disadvantages.
a. Biometrics (biological measuring)
b. Smart cards
c. Biochips
Step by Step Solution
3.34 Rating (169 Votes )
There are 3 Steps involved in it
a Biometrics biological measuring Biometrics involves measuring an immutable and unique physical trait and using these measures to identify an individual This process requires that a person has previo... View full answer
Get step-by-step solutions from verified subject matter experts
Document Format (1 attachment)
224-C-S-I-S (290).docx
120 KBs Word File
