What form of authentication would you use for relatively unimportant resources?
ID: 3881964 • Letter: W
Question
What form of authentication would you use for relatively unimportant resources? Justify your answer. What form of authentication would you recommend for your most sensitive resources?
What is host hardening? What are the three steps in hardening servers? What are the steps in hardening client PC's? What are group policy objects (GPO's)?
What is a cipher? Distinguish between symmetric key encryption and public key encryption for confidentiality. What kind of encryption for confidentiality is used in all common applications?
Explanation / Answer
What form of authentication would you use for relatively unimportant resources? Justify your answer. What form of authentication would you recommend for your most sensitive resources?
In the computer security, Authentication is nothing but the process of identifying a person that he/she is authorized(eligible) or not. Usually the person who is tring to get access is nothing but an applicant and there are so many softwares and mmethods whhich works as verifiers. Then the root or supplient sneds credentials. After that verifier verifies the identity.For relatively unimportant resources, I would recommend passwords and those passwords are enough for them.Why I would recommend is that users are femilier with their own passwords and very easy to access. Passwords are very low in cost while comparing with other. Generally most of the operating systems have built-in authentication.
For the most sensitive resources, I would recommend digital certificates. Because in cryptography world digital signature is the most secure method and it will keep resources very safely. Usually digital signature methods are very expensive. As pewr this method each person who needs to access sould contain private key and CA verifies his/her key with public key and then it exhanges digital signatures. So that oit is very difficult to attackers to trap.
What is a cipher? Distinguish between symmetric key encryption and public key encryption for confidentiality. What kind of encryption for confidentiality is used in all common applications?
In computing world, cipher is may be any method of encrypting text or rearranging process.Sometimes used to refer to the encrypted text message itself. Cypher text is mainly used in encryption methods.Cryptography is nothing but a method which is mainly used for storing and transmitting data in a particular form. Symmetric encryption only uses a single key for both encryption and Decryption. While Asymmetric Encryption uses two keys, one is privite and one is public.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.