Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Hands-On Projects Project 2-1: Levels of Authentication Required for this project: - Windows, Apple Mac OS X, Linux, or Unix with a web browser In

image text in transcribedimage text in transcribedimage text in transcribed

Hands-On Projects Project 2-1: Levels of Authentication Required for this project: - Windows, Apple Mac OS X, Linux, or Unix with a web browser In this project you will explore the levels of identification and authentication used by the online merchant web site Amazon.com. Many web sites use several levels of identification and authentication that correspond to various activities and functions that a user might perform on the web site. 1. If you do not have an online account with Amazon.com, set one up now. Log in, then log off. 2. Remove any cookies associated with Amazon.com. In Firefox for Windows, go to Tools > Options > Privacy > Cookies, then search for and remove it's slightly different. You have to click Firefox, then Preferences, then click Privacy, then if necessary, click Use custom settings for history, then you will see the Show Cookies button. In IE, go to Tools > Internet Options > Privacy > Sites. In Safari for Windows, go to Edit > Preferences > Security > Show Cookies. For Safari on a MAC, you have to click the Safari button, then Preferences, then click the Privacy tab, then Details button. Note: Browser design over time may mean that the method used to view cookies may have changed. 3. Go to the Amazon.com web site and note how it identifies you. Since you have removed your cookies, you should appear as an anonymous user or first-time visitor to : 4. Log in to the Amazon.com web site, and then log out. This will reestablish your userid cookie with the web site. 5. Visit Amazon.com again. This time, Amazon should recognize you and display a "Welcome back" message, similar to what is shown in Figure 2-8. though the web site recognizes you, it may ask you to reenter your password, proving your identity through authentication, before showing you potentially sensitive information. What mechanisms were used to identify you in this project

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Design And Relational Theory Normal Forms And All That Jazz

Authors: Chris Date

1st Edition

1449328016, 978-1449328016

More Books

Students also viewed these Databases questions