Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Question4 Based on the following diagram (Unit 4 course material, pg 38), provid

ID: 3714126 • Letter: Q

Question

Question4 Based on the following diagram (Unit 4 course material, pg 38), provide an example for each level of the pyramid security authentication method given. Use diagram to explain your answer Pyramid of Authentication Technologies Higher level of security offered. For highly valued information. User's private key is kept in a device such as a smart card. Biometrics are also used to protect key PKI Plus biometrics Digital Signature Certificate- PK Digital Signature Users private key is stored on a portable computer device such as a disk. User name and password authenticates user-Pretty Good Privacy encrypts data. Certificate-PGP User name and password authenticates user- Secure Socket Layer software encrypts data Password +SSL Lower level of security offered. For less valuable information User name and password authenticates user without any encryption. Tokens are used as a second factor of authentication Password/Tokens This file is licensed under the Creative Commons Attribution-NonCommercial 3.0 Unported license. Figure 4.21 Pyramid of authentication technologies Source: Commonwealth of Australia 2012, http://www.archive.dbcde.gov.au/2009/ may/trusting the internet-_a small business guide_to_e-security/how_do e- security technologies_work

Explanation / Answer

1) Password/Tokens:

Login to the computer systems, where no encryption is used for authenticating user, just simple user name and password does the trick

2) Password + SSL:

User is prompted to enter there user name and password, and then the inputted information is encrypted and then moved further for authentication. Internet Banking sites implements this kind of security level for the authentication of the user

3)Digital signature Certificate (PGP):

User s prompted to input there authentication information and then the encrption and decryption is achieved by sharing public-private key, this can be seen in chat rooms, or chat servers for authenticating and establishing a secure connection between two paties such that only the one who knows the decryption key can receive the message.

4)Digital Signature Certificate (PKI):

In this kind of encryption a private key encryption is used and then will be used and stored for the decryption, this is Public key infrastructure

this can be achieved by the key archival in secure shared locations .

5) PKI plus biometrics:

the best example of this kind of securty can be seen in debit cards, where the private key is stored in a smart card,, such that person having access to the card can be able to acess and decrypts the information

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote