Question

should be a minimum of 300 words, Authentication is very important to everyone’s security on the...

should be a minimum of 300 words,

Authentication is very important to everyone’s security on the net.
Oops! I forgot my password! This happened to almost everyone who uses any type of online accounts.

- How would I get back to my account?
- Most websites use secret question backups, list and explain 3 alternatives to secret questions backups.
- What are the problems with “secret questions” for authentication?

Feel free to include real life examples and personal experiences.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

In computer terminology, Authentications means the verification of a user's identity. It confirms one's identity and provides the access to the genuine user only. In web applications, it is generally based on username and password. If the credentials match, the login process is completed and the user is granted authorization for access.

However, today there are many websites where we register and we generally try to keep different passwords for them. Then it becomes difficult for us to remember the passwords and we tend to reset the password again using "Forgot password?" option through which we are either sent a reset link or OTP on mobile or some secret questions to verify our identity so that identity theft does not happen.

But do you think the secret question backup idea is good enough to refrain identity theft??

I don't think so, answer to these questions like "What was you first gradution school?", "What is your pet name?", "What is your mother's maiden name?", "Who is your favourite author?" etc. are so common to be guessed by anybody who knows us. So, this doesn't make sense to me as a secret.

Also, is it necessary that we do have some secrets which no one is aware of? Not at all, in some form or the other people who know us can guess the correct answers to these questions. Let me share one of the real time exaple that happened with me.

During last year summer vacations, I was travelling to my hometown, had no internet connectivity while travel. I got a call from college asking for submitting my marksheets softcopy by the end of day. I had those copies stored on my email account but had no internet connectivity so I called one of my friend asking him to access my email and share the marksheets with college authority. I needed to share my credentials with him but I have the same credentials for my facebook account too so I decided on telling him to use the 'Forgot password' option using OTP on mobile and I would have shared the OTP over call.

To my ashtonishment, he called me in 5 minutes and told me that he has shared the marksheets using my email to the college authority. I was surprised as to how did he get through my email authentication without OTP. Then he shared that he chose the secret questions backup option and answered the questions on his own in a hit and trial manner. He told that all the answers like my first school name, my pet name and my favourite author he was knowing well so he unlocked my account and changed the password.

I was speechless at the moment, neither I could chide him for using such option nor I could really be thankful for his favour. I still thanked him and the very moment decided to enable double security method for my email account so that on every login OTP is sent to my mobile so that no one else can misuse it.

I personally feel that 'secret questions' authentication method is not so strong to stop cyber crimes. It should be replaced with more meaningful verification methods.

With the advent of technology, these days devices come with finger print recognition, retina authentication, face detection authentications. Such methods are really helpful and strong enough to be not broken by anybody else.

Please always go for powerful authentication methods for protecting your information and data.

Add a comment
Know the answer?
Add Answer to:
should be a minimum of 300 words, Authentication is very important to everyone’s security on the...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • David’s Story “Life is difficult.” I once read these three trivial words in a book, but...

    David’s Story “Life is difficult.” I once read these three trivial words in a book, but never knew how true to life and impactful they would be until one fateful fall evening. Before I begin, let me back up and tell you more about who I am and how I got here. I am a Caucasian male raised in a small conservative town in Maine by hard-working middle-class parents. My compassionate mother juggled raising three rambunctious children, me being the...

  • IN YOUR OWN WORDS. 100 words for each question. read the article attached and answer. Discuss...

    IN YOUR OWN WORDS. 100 words for each question. read the article attached and answer. Discuss the importance of confidentiality, integrity and availability. Discuss some of the pertinent principles in health informatics ethics Based on you information provided on confidentiality, integrity, availability, and ethics, discuss what would you do as the resident physician and explain why. CHAPTER 2 Ethical Decision-Making Guidelines and Tools Jacqueline ). Glover, PhD Scenario 2-A Decision Making for an Adolescent M Learning Objectives After completing this...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • In his own words, Daniel Jones was 'The Dude." With his waist-long dreadlocks, part-time rock band,...

    In his own words, Daniel Jones was 'The Dude." With his waist-long dreadlocks, part-time rock band, and well- paid job managing a company's online search directory--he seemed to have it all. Originally from Germany, Jones, now age 32, earned his doctorate and taught at the University of Munich before coming to the United States, where he started his career in computers. When Jones started working with the company as a director of operations for U.S.-Speech Engineering Service and Retrieval Technology-he...

  • STEP 1: In your own words define problem employees and the categories they may fall into....

    STEP 1: In your own words define problem employees and the categories they may fall into. For the second or last paragraph provide your opinion on which employee type is the most difficult. DEFINITION : I think that "problem employees" are employees that either directly or indirectly hinder the organization's mission or vision, and break down into roughly four categories. In general, problem employees can be classified into two broad categories - employees creating problems for the organization and employees...

  • Actions that damage a company and its employees should be stamped out, everyone would agree. But ...

    Actions that damage a company and its employees should be stamped out, everyone would agree. But should the people responsible be stamped out, too? HBR CASE STUDY The Reign of Zero Tolerance by Ben Gerson "Mr. Pemberton?" manager. The guards had radioed her that the "Yes, that's me," Simon replied distractedly, his back turned. target wasn't putting up much resistance. "Your personal belongings will be messen The two burly gentlemen who had suddenly gered to your home later today," Sallie...

  • 10. The Beck & Watson article is a Group of answer choices quantitative study qualitative study...

    10. The Beck & Watson article is a Group of answer choices quantitative study qualitative study 11. Beck & Watson examined participants' experiences and perceptions using what type of research design? Group of answer choices particpant obersvation phenomenology 12. Select the participants in the Beck & Watson study Group of answer choices Caucasian women with 2-4 children Caucasian pregnant women 13. In the Beck & Watson study, data was collected via a(n) Group of answer choices internet study focus group...

  • Direction: review the eassy prof it and summerize it. Add thesis with it. make changes if...

    Direction: review the eassy prof it and summerize it. Add thesis with it. make changes if posible Title The coporate puzzel When all you believe is people behind you until they turn their back on you. Times are hard when you are not to be worried about anything in life. I had a great job with a very working paid. Things were going smoothly until one day I had a call to my manager’s office saying he will like to...

  • 14. Select the number of participants in the Beck & Watson study Group of answer choices...

    14. Select the number of participants in the Beck & Watson study Group of answer choices 8 13 22 35 15. Beck & Watson determined their final sample size via Group of answer choices coding saturation triangulation ethnography 16.Through their study, Beck & Watson determined Group of answer choices after a traumatic birth, subsequent births have no troubling effects after a traumatic birth, subsequent births brought fear, terror, anxiety, and dread Subsequent Childbirth After a Previous Traumatic Birth Beck, Cheryl...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT