Write review about article - two-factor authentication

Assignment Help Computer Engineering
Reference no: EM131932740

Write review about this article with references in APA format

In our world today, one cannot deny the impact that the Internet has on all aspects of our society and security is more thought of today during software designs. Two-factor authentication is mostly based on the concept of something you know, something you have, something you are and where you are.

Two-factor authentication also known as 2FA is one of the greatest means of improving an online security account. Fortunately, most websites have adopted this new security measure and it has become a lot more common on the web today, adding an extra layer of security to our accounts online. Incorporating any of these two methods together will provide a higher level of security to a website or software, making compromise harder.

Using a password in combination with images and games can help strengthen the security of a website but care should be taken when combining authentication types that are not common because of user rejection.

This goes back to the CIA triad where an increase in one could affect the other. Our objective is simply to permit the right amount of security. But more security features will almost always influence the ease of use. To provide a true dependable two-way authentication between humans and computers a CAPTCHA is a wildly accepted method. By combining CAPTCHA with other forms of authentication, true human authentication can be achieved.

A middleperson attack simply is like listening in on a conversation between two systems. When information is sent from a system to a server or website, anyone along the path of that information such as an ISP can be able to intercept that information or even modify it. Detecting a middleperson attack can be very difficult and the best solution is preventing it.

The most common solution is the use of VPNs which provides encryption for your data passing through your ISP. On the down side, if you are using a commercially available or paid VPN service, they too can be able to employ a middleperson attack. The best solution to middleperson attack will be end-to-end encryption.

This method is the best but also not feasible on all websites since we cannot implement encryption on systems we do not own. In the book of Proverbs 25:2 it says, "It is the glory of God to conceal a thing: but the honor of kings is to search out a matter".

References Anderson, R.J. (2008). Security Engineering: A Guide to Building Dependable Distributed Systems (2nd ed.). Hoboken, NJ: Wiley. ISBN: 9780470068526. Two-factor authentication. (2007, October). Database and Network Journal, 37(5), 26.

Verified Expert

This task presents the review of the article provided, which is based on the security on internet and two factor authentication. In this task the article has been reviewed in 150 words using APA reference.

Reference no: EM131932740

Questions Cloud

Discuss the importance of community health : How does what you observed in your own community relate to what you read about in Chapter 3 of Global Pubic Heath this week as far as the importance.
Find the sample mean of observations : A random sample of nine observations are drawn from the population, and we find the sample mean of these observations is = 17. The P-value is closest to
Compare and contrast dna and rna : Discuss why humans did not evolve with one central repository of DNA, but rather it is replicated throughout the body?
Explain the mission of your organization : Explain the mission of your organization. What value you add to the organization and what role Christianity currently plays in this organization.
Write review about article - two-factor authentication : Write review about this article with references -In our world today, one cannot deny the impact that the Internet has on all aspects of our society and security
The person selling the investment : If you calculate that the present value of this investment is $35,000, who is using the higher interest rate, you or the person selling the investment?
What is the most you would pay today for fanshawe stock : If investments with the same risk as Fanshawe's stock have an expected return of 10.75%, what is the most you would pay today for Fanshawe's Stock?
What are the tariff or non-tariff trade barriers : What are some specific examples of tariff or non-tariff trade barriers? Examine the impacts of tariff or non-trade barriers on the global trading system.
Which investment has the lower IRR : The NPV of M is lower than the NPV of N at a required return of 14%, which investment has the lower IRR?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Describe the methods you would use to identify

Describe the method(s) you would use to identify the related exploit(s). Explain your desired method(s) to perform this vulnerability analysis.

  Perform a monte carlo simulation

Perform a Monte Carlo simulation when the binary signaling is on-off-keying (OOK) and the channel is a slowly fading frequency nonselective Rayleigh channel.

  Write a program that lists from the current directory

Write a program that lists from the current directory all ordinary filenames whose size exceeds 100,000 bytes. It should also remove all zero-sized files.

  How the next-state samples are generated

Present the algorithm clearly and mathematically, specifying exactly how the weights are computed and how the next-state samples are generated.

  How a variable called employee is an abstraction of problem

Variables in programs are also used as abstractions in the problem domain. Explain how a variable called employee is an abstraction of a problem-domain concept.

  Define a prefix of a string is a substring string

An exact match will override a prefix match. For instance, the prefix "car" matches the given word "car" exactly. Therefore, it is understood without ambiguity that "car" is an abbreviation for "car", not for "carriage" or any of the other words i..

  Write the php script that produces the current results

Write the PHP script that produces the current results of the survey of Exercise 9.11. Write HTML document to create a form that collects favorite popular song.

  Write a program that uses the same recursive structure

Write a program that uses the same recursive structure as the closest-pair implementation given in the text to find the convex hull of a set of points.

  Select which currency they wish to display

Expand the "Currency Conversion" program to have a menu of five currencies that allows the user to choose which currency they wish to show in its equivalency to the US dollars.

  Creating a new domain tree root checkbox

In case, I select the “Create a new domain tree root checkbox” in place of the “Create a new child domain checkbox”, how would configuration of the forest be different?

  Document any conflicts that may arise between

write an organizational policy to address this it-related ethical issue should personal information be exchanged

  Assess the importance of a systems development life cycle

write a five to six 5-6 page paper in which youdetermine within the health care setting the main features capabilities

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd