In addition to the holy trinity of \"somethings\" discussed in this chapter (som
ID: 3809103 • Letter: I
Question
In addition to the holy trinity of "somethings" discussed in this chapter (something you know, are, or have), it is also possible to base authentication on "something you do." For example, you might need to press a button on your wireless access point to reset it, proving that you have physical access to the device. Give another real-world example where authentication could be based on "something you do." Give an example of two-factor authentication that includes "something you do" as one of the factors.Explanation / Answer
Answer:
Authentication:is the process of assessing the identity of each individual claiming to have permission to use a resource.
a)Real-Word Example of authenticatin based on "something you do" :
Healthcare clinicians have respncibility for taking reasonable steps to authenticate the identity of crrespondents in electronic communication and to ensure that recipients of information are authorized to receive it. Authentication of the patient or an authrized patient prxy(i.e.parent of a minor,authorized family member,etc.)for patient provider online communication including the delivery of patient data is imprtant in order to ensure patient privacy and confidentiality. clinicians are encouraged to follow these suggestins for patient authentication:
b) Two-Factor Authentication:
Two-Factor authenticatin promises defense in depth. if one authentication method is broken, the imposter will still not be able to authenticate him or herself.
Example of two-factor authentication:
A token device and a PIN
Two-Factor authenticatin uses two different types of authentication(I.E. a combination of type 1,type2,and type3 authentication).Of the examples listed here, a token device (type2) combined with a PIN(type1) is the only example of two-factor authentication.
If client PC is infected with a Trojan horse, the trojan horse can send transactions when a user has already authenticated him or herself to an e-commerse site.If a user's computer is compromised, two facror authenticatin means nathing.
Two-Factor authentication can ffen be defected with a man-in-the-middle attack. If auser logs into a fake banking website, the fake site can act as a silent go-between to the real banking website.After the user successfully authenticates the fake website can execute transactions of its own on the real website in here developer some thing do to avid this conflect.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.