Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

uestion 4 Based on the folloving dlagram , provide an example for each level of

ID: 3718955 • Letter: U

Question

uestion 4 Based on the folloving dlagram , provide an example for each level of the pyramid security authentication nethod given. Use diagran to explain your ansver Pyramid of Authentication Technologies Higher level of security offered. For highly valued PKI Plus biometrics User's private key is kept in a device such as a smart card. Biometrics are also used to protect key Digital Signature Certificate-PKI Users private key is stored on a portable computer device such as a disk Digital Signature Certificate PGP User name and password authenticates user-Pretty Good Privacy encrypts data. User name and password authenticaters user-Secure Socket Layer software encrypts data. Password +SSL Lower level of security offered. For less valuable information. User name and password authenticates user without any encryption. used as a second factor of authentication. Password/Tokens Tokens are This file is licensed under the Creative Commons Attribution-NonCommercial 3.0 Unported license. Figure 4.21 Pyramid of authentication technologies Source: Commonwealth of Australia 2012, http://www.archive.dbcde.gov.au/2009/ may/trusting_the_internet - _a_small_business_guide to_ e-security/how_do e- security_technologies_work

Explanation / Answer

Answer)

The examples are as below:

1) Password/Tokens: The client application requests the access token with the help of username and password and directs it to the sales force to verify the credentials.

2) Password + SSL: Password used in Ubuntu server. A passphrase is used to encrypt the secret key.

3) Digital Signature Certificate + PGP: The digital signature used in Adobe Acrobat which verifies the signer’s identity with the help of signer’s public key to decrypt the document hash.

4) Digital Signature Certificate and PKI: This is the highest level of security. The PKI generates 2 long numbers called as key one being public and the other private. This needs a CA to save it with security. Example: DocuSign

5) PKI + Biometrics: These days even the mobile device uses the PKI and biometrics for authorization. Even the smart cards being used by the several Organizations also contains this kind of security techniques. Example: ICICI Bank Mobile App.

Do let us know if you need any further details on this question.

Hope this answer helps. :) Happy to help.