Question: ( ( 4 0 % ) ) Comparing with one - factor authentication, two - factor authentication provides more protection to the
Comparing with onefactor authentication, twofactor authentication provides more protection to the user identity in online services. Please compare three different types of currently available techniques for second factor with regarding to a Password cracking b Eavesdropping c Loss of second factor d Trojan horse or Key logging e MenintheMiddle prevention As part of a formal risk assessment of information systems in a
small accounting firm with limited IT support, you have identified the
assets "database and its backup systems" and "integrity of customer and
financial data report files on desktop systems." And the threats
"synchronization of database and its backup" and "corruption of these files
due to import of a wormvirus onto system." Suggest reasonable values for
the items in the risk register shown in Table for this asset and threat,
and provide justifications for your choices.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
