Make a comparative study (with a comparative table and discussion) of the five (05) presented authentication methods
Question:
Make a comparative study (with a comparative table and discussion) of the five (05) presented authentication methods (Static authentication by a shared secret, OTP-based authentication, Cryptographic Challenge-Response based authentication, RFID-based authentication, Biometric authentication) using the following criteria:
- The ease of use is the general usability of the authentication method: the user acceptance, the token and its form factor, and the potential availability of the system (for example, it could be different for an online or an offline system). Ease of use is a critical criterion as it is commonly the first cause of failure of the establishment of an authentication method in an IT system.
Business Statistics in Practice
ISBN: 978-0077404741
6th edition
Authors: Bruce Bowerman, Richard O'Connell