Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Password Polices and Authentication Methods Responses

12/08/2020 Client: saeed Deadline: 24 Hours

Provide (2) 150 words response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that's discusses the responses. 100% original work and not plagiarized. Must meet deadline.


RESPONSE 1:


1) Discuss security design principles utilizing different authentication methods and (password) policies.


To begin, authentication is the act or process of verifying and/or proving the identity of a user to show validation. Some common methods of authentication often seen are, username and password, which are usually used on personal computers, e-mail accounts and such. Another methods commonly used for authentication are smart cards, such as common access cards (CAC), mainly used by Department of Defense agencies such the United States Air Force, Army, Marines and Navy; to include other agencies such as the Federal Bureau of Investigation and Central Intelligence Agency. With these agencies using smart cards, this implemented another form of authentication utilizing key certificates to authenticate users accessing information systems.


When discussing security design principles, the first thing that comes to mind is the CIA Triade; Confidentiality, Integrity and Availability or better yet, Confidentiality, Integrity, Availability and Authentication (CIAA). The CIA Triade plays a critical role when discussing the principles of authentication methods and is the building blocks of password policies. During the creation and implementation of user accounts and groups, creating a strict criteria plays a crucial role in preventing unwanted intrusion from attackers. Different methods include, enforcing password complexity/variation, password length, password history/number of times a user can use the same password, password expiration/maximum length of time a user can use the same password, account lockout after inputting the incorrect password to many times and lastly utilizing access control list (ACL).


After completing last week and this week’s lab, I’ve come to the realization that the main purpose or idea behind authentication methods and password policies is to keep out systems safe and secure from intrusions from attackers with malicious intent.


Authentication. (2018, July 13). Retrieved August 11, 2020, from https://techterms.com/definition/authentication


Jonathan


RESPONSE 2:


This week’s forum post asks us to discuss design principles utilizing different authentication methods and (password) policies. My experience working in a corporate environment in research and development with a company given laptop, I have had to deal with a lot of authentication and password policies. Though I find it tedious and annoying at times having to change my password or having to do second factor authentication, I understand that they want or patented technology to be secure. Many of us have been in the military and know how tedious the DOD password policies can be. Even the pharmaceutical company I work for now requires their regular employees to change their password every thirty days and it can’t be the same password as the previous five passwords. There are many different authentication methods and password policies. Since our lab dug into password policies last week, I will discuss more of the authentication methods. Biometrics is a common form of authentication. Biometrics can be fingerprint scanning, voice recognition, retinal or iris scans, and face scanning. These can be expensive so it might not be suitable for many companies that don’t need such stringent security protocols. Token authentication can include such hardware as a dongle or RFID chip card. Many of the companies I have work for utilize the token authentication because it is cheaper and fairly secure. My current company requires an RFID card to open all doors in the building and when logging on to a computer you need your login credentials and we use Microsoft’s Authenticator App. Thanks for reading and take care.


References,


Ulisticadmin. (2019, August 16). Common Authentication Methods Used for Network Security. Retrieved August 11, 2020, from https://www.alliancetechpartners.com/common-authentication-methods-used-network-security/


Regards,


Chris

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Online Assignment Help
Engineering Guru
Top Essay Tutor
Writer Writer Name Offer Chat
Online Assignment Help

ONLINE

Online Assignment Help

I am an elite class Ph.D. writer who can deliver you a supreme level of content within your given deadline. I will give you plagiarism free content within your given timeline.

$95 Chat With Writer
Engineering Guru

ONLINE

Engineering Guru

Hello, I have more than 10 years of writing experience. I can manage essays, summaries, reports and analysis works in very short period of time. I produce plagiarism free content for my clients, will send you FREE TURNITIN Reports as well. Thank you.

$120 Chat With Writer
Top Essay Tutor

ONLINE

Top Essay Tutor

I feel, I would be the best choice for this project, I have more than 10 years of working experience in writing essys, reports, case studies and dissertations. Give me your work and get relax

$90 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Whirlpool innovation case study - Term Paper and Presentation Part 2 - Product life cycle questions and answers - Nursing. - The mean annual premium for automobile insurance - Jet stream income - St george eftpos help - Nfl redzone verizon fios - The rising of the moon - Week 3 discussion business - Alternating bands of gray and pigmented hair - When was the seagull written - Who were troubadours what was their music like - Statement of Purpose - Psychological first aid questions and answers - Fraud cases that involved agency conflicts - Employ: Research Process High-speed rail - The woodworkers association of new south wales - Ch3ch2coch3 name of functional group - Access 2016 module 1 sam project 1a - Ainsworth and bowlby 1991 - 3820 #5&6 - Slla constructed response practice questions - A set of data consists of observations - When were motte and bailey castles built - Dr joseph john cmc ludhiana - Elevit cause black stools - View the film "Phil Zimbard - Pathmaker internship interview - Uspto trademark class list - Anti drug legislation matrix - 16mm diameter to circumference - Titration for acetic acid in vinegar lab - The par value of common stock represents - Tracking is an assault on liberty summary - Montgomery Bus Boycott - Performance with purpose indra nooyi - Geopolitical and phenomenological place influence the context of a population - Physical science chapter 2 review answers - Organizational structures in Information technology startups - Concept analysis paper on clinical manifestations amount adolescent and young adults that can be predicted by the increased use of synthetic drugs over time - Why was king george the third important - Pacific dunlop ltd v hogan case summary - Comprehensive problem 1 the accounting cycle part 1 - South molton health centre - ENG 122 Revision Reflection - What is a passing grade at saint leo university - Biology 1408 exam 2 answers - 3 reasons why phones should be allowed in school - Www phe eqa org uk - Monitor/con & closing the Project - The pitcher by robert francis - Animal cell model flat - MAK Question - Topic 1 DQ 2 {Due in the next 4 hours} - Effect of salt on boiling point of water experiment - The theory of multiple intelligences was proposed by ________ - Stocks and bonds examples with solution - Usyd tennis court booking - Comment - Triarchic theory of intelligence definition - Keystone computers networks inc solution - Semhs school loop - Pt tata consultancy services indonesia - Muslim Molvi 7340613399 OnLine No 1 FaMOUs VashIKaraN sPecIaLIsT IN SouthDumdum - Swot analysis of biotech industry - Mail unit bx1 1lt - Miller corporation has a premium bond making - Clark rubber marine carpet - If equity is $300,000 and liabilities are $192,000, then assets equal: - Landgate power of attorney form - COm303 Week 4 Discussion 12 - Glb Ethics - Cloud Computing - Bit stuffing in hdlc - Prin of Mgnt - D/B 1 (3 times) - The giver assignments pdf - Touchstone 2-3 - Exam - Becoming a master manager a competing values approach 6th edition - Edward scissorhands margaret river - IRB Site Authorization Letter - Apa style article critique sample - Flinders car park 13 - 3.1 10 project complete your assignment - Vocation of the business leader - Wk7 DQ1 Discussion Question 1 – CLO 1, CLO 2, CLO 3, CLO 4, CLO 5, CLO 6, CLO 7, CLO 8 - Risk Management and Mitigation Planning - List of polyatomic ions - Who is nordstrom's target market - Be prepared a practical handbook for new dads epub - D1 - Crimelibrary com serial killers - 1244 toorak road camberwell - P5#2 - Thorstein veblen technological determinism - Information technology policies and procedures for company - Thesis and Outline Poem WWI - Variable speed diesel generator - 700 words: Information Technology and Organizational Learning. Please look in the description for detailed info.