Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Research the authentication issue online. There will be many more recent article

ID: 3571856 • Letter: R

Question

Research the authentication issue online. There will be many more recent articles, but at this time, we recommend, as a starting point, Singing the Password Blues by Paul Thurrott at windowsitpro.com. Where are we headed? Your own mobile devices may now have biometric login using fingerprints. Or you may have opted for two-factor authentication offered for all devices related to an account. Research what options are available to you beyond the use of passwords or PINs and describe the state of these authentication methods. What do you prefer to use? Why? What would you like to see happen in this area?

Explanation / Answer

Yes authentication needs to be in place to make sure data doesnot go in wrong hands or unauthorised person , who is not allowed to access the information. The most common way is to keep password and there are ways a password could be kept, it could be text or some pattern or biometrics option to access using fingerprints.Some other techniques are smart cards, which is security chip embeedded in a chip which provides secure access.Another method could be certificates, which is a digital binding to key value pair which are stronger than password till the private key is protected.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote