Answered step by step
Verified Expert Solution
Question
1 Approved Answer
uestion 4 Based on the following dl agram , provide an example for each level of the pyramid security authentication method given. Use diagram to
uestion 4 Based on the following dl agram , provide an example for each level of the pyramid security authentication method given. Use diagram to explain your answer. Pyramid of Authentication Technologies Higher level of security offered. For highly valued information. PKI Plus biometrics User's private key is kept in a device such as a smart card. Biometrics are also used to protect key. Digital Signature Certificate-PK User's private key is stored on a portable computer device such as a disk. Digital Signature Certificate -PGP User name and password authenticates user -Pretty Good Privacy encrypts data. User name and password authenticates user -Secure Socket Layer software encrypts data. Password+SSL Lower level of security offered. For less valuable information. User name and password authenticates user without any encryption. Tokens are used as a second factor of authentication. Password/Tokens This file is licensed under the Creative Commons Attribution-NonCommercial 3.0 Unported license. Figure 4.21 Pyramid of authentication technologies Source: Commonwealth of Australia 2012, http://www.archive.dbcde.gov.au/2009/ may/trusting_the_internet_-_a_small_business_guide_to_e-security/how_do e- security technologies_work
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started