Design such a password protocol and evaluate its usability

Assignment Help Computer Network Security
Reference no: EM13339041

An increasingly common mechanism is to ask for several pieces of security information rather than one. A call center might ask not just for your mother's maiden name, a password, and the amount of your last purchase, but also your dog's nickname and your favorite color. Such schemes need careful evaluation of their usability and effectiveness using the tools of applied psychology. Design such a password protocol and evaluate its usability and effectiveness. (A verbal text description is enough.)

Reference no: EM13339041

Questions Cloud

What is the electric field within the solid in unit-vector : A conducting rectangular solid of dimensions dx = 5 m, dy = 3m, and dz = 2m moves at a constant velocity V= 20 i m/s through a uniform magnetic field B = 30 mT j.
Find how far along the incline does the box travel : The initial speed of a 2.51-kg box traveling up a plane inclined 37° to the horizontal is 4.42 m/s. How far along the incline does the box travel before coming to a stop
Which has the weakest gravity at its surface : Which has the weakest gravity at its surface.
How much power would be produced by these falls : Water flows over Victoria Falls, which is 128 m high, at an average rate of 1.30 106 kg/s. how much power would be produced by these falls
Design such a password protocol and evaluate its usability : An increasingly common mechanism is to ask for several pieces of security information rather than one. A call center might ask not just for your mother's maiden name, a password, and the amount of your last purchase, but also your dog's nickname a..
Select a health care organization : Select a health care organization
What is the smallest insect a bat can detect : A bat can detect small objects, such as an insect, whose size is approximately equal to one wavelength of the sound the bat makes. what is the smallest insect a bat can detect
What is its moment of inertia about the rotation axis : A flywheel 0.500 m in diameter pivots on a horizontal axis. A rope is wrapped around the outside of the flywheel, and a steady pull of 75.0 N is exerted on the rope. What is its moment of inertia about the rotation axis
Develop classes describing various types of buildings : Describe how inheritance might be used to develop classes describing various types of buildings.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Eulers theorem problem

Any cipher system that needs to avoid encrypting certain messages should be avoided like the plague - what do you have to say for yoursel

  Security of information in business organisations

Definitions and descriptions of the terms, 'integrity', 'availability' 'confidentiality', 'authenticity' and 'non-repudiation' in relation to the security protection of information assets in the chosen topic environment, i.e. what is it about thes..

  What might be your three most important concerns

Many hackers claim to believe that "access to computers should be unlimited and total" and that "all information should be free." Do you agree with these statements? Why or why not?

  Groups of people involved with computer security

What are the many groups of people who are involved with computer security? Name the groups and elaborate on their functions.

  Was the tjx break-in due to a single security weakness

Explain different ways that this program can be sabotaged so that during execution it computes a different sum, for example, 3 to 20.

  Responsibility of confidentiality to previous employer

You have taken a job with a software user who has contracted your previous employer to develop a system for them. However, you have also a responsibility of confidentiality to your previous employer.

  What is the value of shared secret key

You have secretly picked the value SA = 17. You begin the session by sending Bob your calculated value of TA. Bob responds by sending you the value TB = 291. What is the value of your shared secret key?

  Configuring dhcp with alternate ip address configuration

By configuring DHCP with an Alternate IP Address Configuration. Describe how this technique could be used in an IT environment of your choosing.

  Developing a simple biometric authentication model

Developing an encryption/decryption demo (mainly for learning and teaching purposes)

  How adequate destruction of materials ensuring privacy

How will your company ensure adequate destruction of the materials thus ensuring an individual's privacy? Will any state-wide, national, or industry standards be met? If so, which ones and how?

  How system with capabilities as access control mechanism

Consider how a system with capabilities as its access control mechanism could deal with Trojan Horses.

  Advantage and disadvantage of key diversi?cation

Sally generates key KA when required as KA = h(Alice,KS ),with keys KB and KC generated in similar manner. Explain one advantage and one disadvantage of key diversi?cation.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd