should be a minimum of 300 words,
Authentication is very important to everyone’s security on the
net.
Oops! I forgot my password! This happened to almost everyone who
uses any type of online accounts.
- How would I get back to my account?
- Most websites use secret question backups, list and explain 3
alternatives to secret questions backups.
- What are the problems with “secret questions” for
authentication?
Feel free to include real life examples and personal
experiences.
In computer terminology, Authentications means the verification of a user's identity. It confirms one's identity and provides the access to the genuine user only. In web applications, it is generally based on username and password. If the credentials match, the login process is completed and the user is granted authorization for access.
However, today there are many websites where we register and we generally try to keep different passwords for them. Then it becomes difficult for us to remember the passwords and we tend to reset the password again using "Forgot password?" option through which we are either sent a reset link or OTP on mobile or some secret questions to verify our identity so that identity theft does not happen.
But do you think the secret question backup idea is good enough to refrain identity theft??
I don't think so, answer to these questions like "What was you first gradution school?", "What is your pet name?", "What is your mother's maiden name?", "Who is your favourite author?" etc. are so common to be guessed by anybody who knows us. So, this doesn't make sense to me as a secret.
Also, is it necessary that we do have some secrets which no one is aware of? Not at all, in some form or the other people who know us can guess the correct answers to these questions. Let me share one of the real time exaple that happened with me.
During last year summer vacations, I was travelling to my hometown, had no internet connectivity while travel. I got a call from college asking for submitting my marksheets softcopy by the end of day. I had those copies stored on my email account but had no internet connectivity so I called one of my friend asking him to access my email and share the marksheets with college authority. I needed to share my credentials with him but I have the same credentials for my facebook account too so I decided on telling him to use the 'Forgot password' option using OTP on mobile and I would have shared the OTP over call.
To my ashtonishment, he called me in 5 minutes and told me that he has shared the marksheets using my email to the college authority. I was surprised as to how did he get through my email authentication without OTP. Then he shared that he chose the secret questions backup option and answered the questions on his own in a hit and trial manner. He told that all the answers like my first school name, my pet name and my favourite author he was knowing well so he unlocked my account and changed the password.
I was speechless at the moment, neither I could chide him for using such option nor I could really be thankful for his favour. I still thanked him and the very moment decided to enable double security method for my email account so that on every login OTP is sent to my mobile so that no one else can misuse it.
I personally feel that 'secret questions' authentication method is not so strong to stop cyber crimes. It should be replaced with more meaningful verification methods.
With the advent of technology, these days devices come with finger print recognition, retina authentication, face detection authentications. Such methods are really helpful and strong enough to be not broken by anybody else.
Please always go for powerful authentication methods for protecting your information and data.
should be a minimum of 300 words, Authentication is very important to everyone’s security on the...
The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...
David’s Story “Life is difficult.” I once read these three trivial words in a book, but never knew how true to life and impactful they would be until one fateful fall evening. Before I begin, let me back up and tell you more about who I am and how I got here. I am a Caucasian male raised in a small conservative town in Maine by hard-working middle-class parents. My compassionate mother juggled raising three rambunctious children, me being the...
IN YOUR OWN WORDS. 100 words for
each question. read the article attached and answer.
Discuss the importance of confidentiality, integrity and
availability.
Discuss some of the pertinent principles in health informatics
ethics
Based on you information provided on confidentiality,
integrity, availability, and ethics, discuss what would you do as
the resident physician and explain why.
CHAPTER 2 Ethical Decision-Making Guidelines and Tools Jacqueline ). Glover, PhD Scenario 2-A Decision Making for an Adolescent M Learning Objectives After completing this...
Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...
In his own words, Daniel Jones was 'The Dude." With his waist-long dreadlocks, part-time rock band, and well- paid job managing a company's online search directory--he seemed to have it all. Originally from Germany, Jones, now age 32, earned his doctorate and taught at the University of Munich before coming to the United States, where he started his career in computers. When Jones started working with the company as a director of operations for U.S.-Speech Engineering Service and Retrieval Technology-he...
STEP 1: In your own words define problem employees and the categories they may fall into. For the second or last paragraph provide your opinion on which employee type is the most difficult. DEFINITION : I think that "problem employees" are employees that either directly or indirectly hinder the organization's mission or vision, and break down into roughly four categories. In general, problem employees can be classified into two broad categories - employees creating problems for the organization and employees...
Actions that damage a company and its employees should be stamped out, everyone would agree. But should the people responsible be stamped out, too? HBR CASE STUDY The Reign of Zero Tolerance by Ben Gerson "Mr. Pemberton?" manager. The guards had radioed her that the "Yes, that's me," Simon replied distractedly, his back turned. target wasn't putting up much resistance. "Your personal belongings will be messen The two burly gentlemen who had suddenly gered to your home later today," Sallie...
10. The Beck & Watson article is a
Group of answer choices
quantitative study
qualitative study
11. Beck & Watson examined participants' experiences and
perceptions using what type of research design?
Group of answer choices
particpant obersvation
phenomenology
12. Select the participants in the Beck & Watson study
Group of answer choices
Caucasian women with 2-4 children
Caucasian pregnant women
13. In the Beck & Watson study, data was collected via
a(n)
Group of answer choices
internet study
focus group...
Direction: review the eassy prof it and summerize it. Add thesis with it. make changes if posible Title The coporate puzzel When all you believe is people behind you until they turn their back on you. Times are hard when you are not to be worried about anything in life. I had a great job with a very working paid. Things were going smoothly until one day I had a call to my manager’s office saying he will like to...
14. Select the number of participants in the Beck & Watson
study
Group of answer choices
8
13
22
35
15. Beck & Watson determined their final sample size via
Group of answer choices
coding
saturation
triangulation
ethnography
16.Through their study, Beck & Watson determined
Group of answer choices
after a traumatic birth, subsequent births have no troubling
effects
after a traumatic birth, subsequent births brought fear, terror,
anxiety, and dread
Subsequent Childbirth After a Previous Traumatic Birth Beck, Cheryl...