Discuss any two kinds of authentication strategies used in organizations

What will be an ideal response?


Technical controls for preventing unauthorized access draw on technologies that can authenticate people and determine what access privileges they should be granted. Reliance on user knowledge is the simplest strategy, although in many ways the weakest and easiest to crack. Financial institutions especially have expanded password security to require the user to have several pieces of knowledge, or to link each login to a particular IP address. They also take the precaution of sending the PIN to account holders by mail in a letter separate from the user ID. Biometric identifiers are also widely used, especially for physical security, since they are more difficult to crack, forge, or copy.

Business

You might also like to view...

Compared to women, men tend to

A. give more tactful feedback. B. indicate their uncertainties. C. be indirect when admitting fault. D. pay more compliments. E. make more apologies.

Business

Filters do all of the following EXCEPT

A) confront companies about their products. B) collect and repackage content. C) maintain a steady objectivity. D) cross over into analysis. E) produce their own journalistic work.

Business

Under the just-in-time costing system, a credit purchase of raw materials is recorded by ________

A) debiting the Raw Materials Inventory account B) crediting the Conversion Costs account C) debiting the Raw and In-Process Inventory account D) crediting the Cash account

Business

In 2013, Terri purchased 260 shares of Flowers R Us stock at a cost of $9,600 as an investment. In 2018, when the fair market value was $11,400, Terri gave the stock to her daughter, Michele. Assuming no gift tax was paid, if Michele sells the stock for $13,800, she will recognize:

A. no gain or loss. B. $2,400 gain. C. $1,800 gain. D. $4,200 gain.

Business