Question: Need a Response to this Discussion Post!!!!! Introduce yourself briefly. Then select an emerging workplace security technology (e.g., authentication technologies such as the RSA key

Need a Response to this Discussion Post!!!!!

Introduce yourself briefly. Then select an emerging workplace security technology (e.g., authentication technologies such as the RSA key fob, common access cards (CACs), facial recognition, or biometric devices) and discuss how the technology is trending in the workforce.

In response to your peers, discuss the human factors or workplace trends associated with the technology in the original post.

Bill James posted

Good evening all, and greets from southern NH!

I'm Bill, and I'm working toward my bachelor's degree in Cybersecurity. I'm a 20-year retiree from the USAF and in that previous life I worked on avionics maintenance and management. All those years in the military, I had a hobby of networking/IT/PC support work that sometimes turned into paying side gigs. As a result, that became career 2.0 when I left active duty. Working as a defense contractor for the past 15 years, I feel drawn to Cyber as a way to continue my service of defending this great nation while staying challenged.

The discussion prompt gave me a chuckle. Having used all of the above in my active duty career as well as my current job, I wouldn't call the listed technology 'emerging'. Some I would call dated. I have carried a CAC since the early 2000's and while smartcards do provide a two factor authentication method, I think it's time for a change. The tech has been in use too long and there are bypass methods in the wild. I also see many apps/services which use cellphones as the 2nd factor authentication. Again, those can be defeated. Cell phone SIM cloning is very common overseas and even domestically by determined threat actors with the right equipment. Additionally, ever try to use your Cellphone 2FA in a SCIF? That first time would likely be your last time.

One thing that has caught my eye is hardware keys. Yubikey makes a nice product that delivers strong 2FA by using a USB or NFC fob that meets government requirements to secure access to both local and cloud resources. Discreet and certainly much less vulnerable to compromise, I would like to see these in use for securing financial access, social media, personal files, and etc. Really adds a good layer of protection.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!