Question: Why is it important to verify the identity of computer users? What are three authentication strategies? Which is the strongest form of authentication? Which is

Why is it important to verify the identity of computer users? What are three authentication strategies? Which is the strongest form of authentication? Which is the weakest? What credentials does your university use to verify your identity for access to e-mail and other web-based information such as personal financial aid information and online course materials? Is this strong or weak authentication? What is a security token? Visit Wikipedia.org to learn how security tokens are used to authenticate users and prepare a brief report of your findings. Do you think it is a good idea to use security tokens to authenticate students? Why or why not?


Step by Step Solution

3.55 Rating (179 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

It is necessary to verify the identity of computer users in order to protect information assets Most ... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Document Format (1 attachment)

Word file Icon

385-B-A-I-S (6244).docx

120 KBs Word File

Students Have Also Explored These Related Accounting Questions!