Question: ( ( 4 0 % ) ) Comparing with one - factor authentication, two - factor authentication provides more protection to the

\((40\%)\) Comparing with one-factor authentication, two-factor authentication provides more protection to the user identity in online services. Please compare three different types of currently available techniques for second factor with regarding to (a) Password cracking (b) Eavesdropping (c) Loss of second factor d) Trojan horse or Key logging e) Men-in-the-Middle prevention(15%) As part of a formal risk assessment of information systems in a
small accounting firm with limited IT support, you have identified the
assets "database and its backup systems" and "integrity of customer and
financial data report files on desktop systems." And the threats
"synchronization of database and its backup" and "corruption of these files
due to import of a worm/virus onto system." Suggest reasonable values for
the items in the risk register shown in Table 14.5 for this asset and threat,
and provide justifications for your choices.
 \((40\%)\) Comparing with one-factor authentication, two-factor authentication provides more protection to

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!