Top-Rated Free Essay
Preview

Paper

Satisfactory Essays
408 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Paper
Title | Week 7: Access Control and Authentication Assessment Test |

Interaction.5 | First of all, which cryptographic technique can be used to verify the identity of a message's sender? | ☑ Shared Secret Key.
☐ Public-Private Key.
☐ Hashing. | | OK, and how would you use public-private key cryptography to identify the sender of a message? | Two different asymmetrical keys are part of a mathematical equation verifying the senders identity. If the correct result is computed, the receiver knows that the message can only have come from the sender. Both the public and private keys are needed to use the PPK, and that adds to the security of it. Using PPK , you can send messages using any open channel and be confident that the message is intact(message integrity), receiver can only read it (privacy), and sent by you (authentication). | | The board seems to think that requiring usernames and passwords is enough security for our users. Do you agree? | ☑ No; we also need other levels of authentication such as machine authentication in order to provide adequate security.
☐ No; we should require a series of security questions at each login attempt to validate the users.
☐ Yes; as long as the users keep them secure, this is adequate security. | | Is two-factor authentication adequate for a bank? Why or why not? | Well basically, you can identify who is accessing data and using a two-factor authentication strategy, a physical device that contains their credentials and password, like a debit card and PIN number. A debit card is something you have and a pin is something you know. Most banks the require users to authenticate each computer they want to access their accounts through. If an account is locked, the bank require users to call in to reset their pin then the agent requires more proof of identity. | | Which networking device is primarily concerned with getting traffic to its ultimate destination? | ☐ Bastion Hosts
☑ Routers
☐ Bastion hosts and routers both do this. | | And how does security differ between routers and bastion hosts? | Routers forward data throughout a network to their intended destination, doing this with an attempt to not overload any particular device in the network; monitoring traffic and keeping it balanced. An application level gateway firewall is called a bastion host, sitting between the public and private network to defend it by using proxy services containing strict security policies and blocking access services from moving across it. | |

© 2011 Toolwire, Inc. All rights reserved.

You May Also Find These Documents Helpful

  • Powerful Essays

    IS3340-Unit 2-Assignment 2

    • 1549 Words
    • 6 Pages

    v. Users or workforce members must ensure that their user identification is not documented, written, or otherwise exposed in an insecure manner.…

    • 1549 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Information Technology is advancing and growing by the minute. Without encryption, credentials sent can be easily intercepted and read by hackers, causing "irreparable damage" to the user and the website owner 's reputation (Eugene Teo, senior manager of security response at security software firm Symantec Singapore, 2014). Security will include monitoring internet behavior, login and log on password rules, software update, and privacy of information.…

    • 688 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    Is a process of identifying a user and about verifying whether someone is who they claim to be. Typically, authentication is achieved by the user sharing credentials that somehow verify the user's identity. It usually involves a…

    • 711 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Predictable passwords could be an issue too. User passwords are probably one of the most vulnerable ways to have a security breach. It is mostly due to weak passwords. Weak passwords being a minimum or 8 characters and not requiring a number and/or a special character. Ensure you emplement “strickt” password complexity standards.…

    • 563 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    07: Password and Ref

    • 4381 Words
    • 33 Pages

    Authentication is the process of ensuring that the individuals trying to access the system are who they claim to be.…

    • 4381 Words
    • 33 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    Without passwords being assigned to data and systems, this simply protection becomes a target for hackers.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    week 3 lab

    • 350 Words
    • 2 Pages

    1. Enforce Password. This makes it so you cannot use the same password more than once or more than 10 times, etc. When you change your password, it cannot be the password you were just using.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The authentication process is a necessity for safeguarding systems against various forms of security threats, such as password-cracking tools, brute-force or wordbook attacks, abuse of system access rights, impersonation of attested users, and last but not least reply attacks just to name a few. In addition, it is imperative that authentication policies are interchangeable with the organizations in which information is being exchanged if resources are being shared between alternative organizations.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    paper

    • 362 Words
    • 2 Pages

    2. What was the allocated source IP host address for the TargetWindows01 server, TargetUbuntu01 server,…

    • 362 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Paper

    • 412 Words
    • 2 Pages

    Per your request, I have spent the past month, assessing and appraising the real estate property at:…

    • 412 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    There are numerous techniques that the Information Technology industry can use in order to substantiate an entities identity, have the ability to authenticate that entity and provide the appropriate authorization for that entity to have access to a networks resource. There are many diverse techniques that are obtainable to accomplish this task.…

    • 630 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Paper

    • 1320 Words
    • 6 Pages

    "At the very heart of any understanding of Pompeii and its archaeology must be the demands of the tourist, who as Maiuri explained was the client of archaeology..."…

    • 1320 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Paper

    • 561 Words
    • 3 Pages

    To receive credit for completing the questionnaire, you need to submit your questions and answers to the dropbox. Follow these instructions to do so:…

    • 561 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    A message requires (a) the originator 's Plain Language Address as shown in the “From:” line of the message, nd (b) the complete date-time-group.…

    • 5067 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    Paper

    • 530 Words
    • 3 Pages

    11. Functionalist Perspective – Every structure serves a function that leads to social cohesion and stability.…

    • 530 Words
    • 3 Pages
    Satisfactory Essays