Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

uestion 4 Based on the following dl agram , provide an example for each level of the pyramid security authentication method given. Use diagram to

image text in transcribed

uestion 4 Based on the following dl agram , provide an example for each level of the pyramid security authentication method given. Use diagram to explain your answer. Pyramid of Authentication Technologies Higher level of security offered. For highly valued information. PKI Plus biometrics User's private key is kept in a device such as a smart card. Biometrics are also used to protect key. Digital Signature Certificate-PK User's private key is stored on a portable computer device such as a disk. Digital Signature Certificate -PGP User name and password authenticates user -Pretty Good Privacy encrypts data. User name and password authenticates user -Secure Socket Layer software encrypts data. Password+SSL Lower level of security offered. For less valuable information. User name and password authenticates user without any encryption. Tokens are used as a second factor of authentication. Password/Tokens This file is licensed under the Creative Commons Attribution-NonCommercial 3.0 Unported license. Figure 4.21 Pyramid of authentication technologies Source: Commonwealth of Australia 2012, http://www.archive.dbcde.gov.au/2009/ may/trusting_the_internet_-_a_small_business_guide_to_e-security/how_do e- security technologies_work

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Sams Teach Yourself Beginning Databases In 24 Hours

Authors: Ryan Stephens, Ron Plew

1st Edition

067232492X, 978-0672324925

More Books

Students also viewed these Databases questions

Question

1. Diagnose and solve a transfer of training problem.

Answered: 1 week ago