Question: Make a comparative study (with a comparative table and discussion) of the five (05) presented authentication methods (Static authentication by a shared secret, OTP-based authentication,

Make a comparative study (with a comparative table and discussion) of the five (05) presented authentication methods (Static authentication by a shared secret, OTP-based authentication, Cryptographic Challenge-Response based authentication, RFID-based authentication, Biometric authentication) using the following criteria:

- The ease of use is the general usability of the authentication method: the user acceptance, the token and its form factor, and the potential availability of the system (for example, it could be different for an online or an offline system). Ease of use is a critical criterion as it is commonly the first cause of failure of the establishment of an authentication method in an IT system.

Step by Step Solution

3.53 Rating (153 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

Step 14 Factors Infrastruct ure cost static auth Challenge response entication Medium le vel cost Ea... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!