Discuss the algebra of authentication and its implications for privacy. That is, assume a situation with two-factor authentication, and call the factors A and B. Consider the four cases in which each one is strong or weak. What conclusions would you draw about the results: weak A and weak B; weak A and strong B; strong A and weak B; strong A and strong B? Does order matter? Does it matter if both

factors are of the same type (what you know, what you have, what you are)? What happens if you add a third factor, C?

What will be an ideal response?


Two
weak
factors
will
provide
weak
protection.
Two
strong
factors
will
provide
strong
protection,
and
likely
more
so
if
they
are
of
different
types
(i.e.,
if
someone
can
steal
something
you
have,
that
person
can
likely
also
steal
a
second
thing
you
have).
One
weak
factor
and
one
strong
factor
provide
similar
protection
to
strong
one-­?factor
authentication,
regardless
of
order.
Adding
more
factors
does
improve
protection,
particularly
if
they
are
of
different
types.

Computer Science & Information Technology

You might also like to view...

Write the number ?9 in two’s complement. Write the number 4 in two’s complement. Write the number ?27 in two’s complement.

What will be an ideal response?

Computer Science & Information Technology

A group of formatting commands, such as font, font size, font color, paragraph alignment, and line spacing, which can be applied with a single command is known as a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Assuming that x is equal to 4, which of the following statements will not result in y containing the value 5 after execution?

a. y = 5; b. y = x++; c. y = ++x; d. y = x + 1

Computer Science & Information Technology

Which of the following loop statements is guaranteed to iterate the body of the loop at least once?

a) while(control) body; b) do body while(control); c) for (initialize; test; update) body; d) none of the above e) all of the above

Computer Science & Information Technology