Question

The Question: If you take a look at the syllabus, one of the goals of the course is basically to make you knowledgeable about how to defend your own computers, online privacy, etc. This is especially...

The Question: If you take a look at the syllabus, one of the goals of the course is basically to make you knowledgeable about how to defend your own computers, online privacy, etc. This is especially true for emerging issues. That is, things that might come up in the future what we didn’t cover in the course. So, in that spirit this question takes a topic that we have not covered, and asks you to look into it and answer some questions.

An important topic in personal cybersecurity and related topics is multiple factor authentication (a popular version of this is two factor authentication). Please answer the following questions, in your own words.

a.) Describe in a short paragraph what multiple factor authentication is.

b.) From the point of view of your own personal cybersecurity, what is the importance of multiple factor authentication?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

a)    In today's world only providing single layered authentication to access the data is not sufficient.As there is tremendously increment in technologies to access the data so cybersecurity also a day by day crucial thing for everyone.Authentication could be happened with

    1)User Knows something e.g.Username and password

    2) User will have something e.g ATM cards,credit Cards

    3) User itself is something e.g. biomatric authentication

So that Multi Factor authentication came into the focus which provides multilayered authentication to access the data because only with username and password,authentication will not be secured.In MFA user has to gone through different ways of authentication like first login with as usual two credentials such as Username and Password or Swipe the cards,enters the pin,then the system will send an OTP to registered email or phone number.If user enters correct OTP then system will redirect the request to expected data.In spite of unauthorized user breaks security of single layered authentication but there will be another layer of authentication to reach to the actual data.Such MFA highly used by Banking Systems,Reservation Systems,Data Storage Systems.

b) Ans.

1) Very first importance of MFA is to tighten the security to protect the data from Unauthorized user.

2) Someone could thought like performing authentication multiple times is really an irritating task but the kind of security has been provided by MFA is the key factor in cybersecurity.

3) From interesting point of view MFA allows user to learn and use different ways of authentications which is actually good.

4) MFA is not bounded to particular device,user can logged into the system through personal desktop,mobile phones anywhere,anytime in the world.

5) MFA also works secrety like hidden CCTV cameras.When user would trying to authenticate into system using personal desktop or phones ,MFA scans mouse movement,fingerprints.

Add a comment
Know the answer?
Add Answer to:
The Question: If you take a look at the syllabus, one of the goals of the course is basically to make you knowledgeable about how to defend your own computers, online privacy, etc. This is especially...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Topic: We all had the unfortunate experience of seeing how computers can, at times, make life's...

    Topic: We all had the unfortunate experience of seeing how computers can, at times, make life's journey abit more difficult. This is especially true in knowledge centric workplaces. Describe an example of a very poorly implemented database that you've encountered (or read about) that illustrates the potential for really messing things up. Include, in your description, an analysis of what might have caused the problems and potential solutions to them. Be sure to provide supporting evidence, with citations from the...

  • Hello! Could you please write your own four paragraph (5-6 sentences per paragraph) take away or...

    Hello! Could you please write your own four paragraph (5-6 sentences per paragraph) take away or reflection of the below information? Please complete in 24 hours if possible. Thank you! RIS BOHNET THINKS firms are wasting their money on diversity training. The problem is, most programs just don’t work. Rather than run more workshops or try to eradicate the biases that cause discrimination, she says, companies need to redesign their processes to prevent biased choices in the first place. Bohnet...

  • Learn to apply your ethical values using the Giving Voice to Value (GVV) method. There are...

    Learn to apply your ethical values using the Giving Voice to Value (GVV) method. There are multiple GVV documents in this Module. Review them all. You may do the exercises suggested in the documents but you do not have to post them in Canvas. You will learn how to factor your personal values into your ethical decisions from the method, you will still use the IDEA case analysis method when analyzing the GVV case, The Client Who Fell Through The...

  • Evaluate the arical writ the response in which you state your agreement or disagreement with writer...

    Evaluate the arical writ the response in which you state your agreement or disagreement with writer up un these questions guidelines 1) can empathy lead us astrary? how 2) our heart will always go out to the baby in the well, its a measure of our humanity. but empathy will have to yield to reason if humanity is to have a future can empathy yield to reason? how? thank you The Baby in the Well: The Case against Empathy* -Paul...

  • Hi there! I need to compare two essay into 1 essay, and make it interesting and...

    Hi there! I need to compare two essay into 1 essay, and make it interesting and choose couple topics which im going to talk about in my essay FIRST ESSAY “Teaching New Worlds/New Words” bell hooks Like desire, language disrupts, refuses to be contained within boundaries. It speaks itself against our will, in words and thoughts that intrude, even violate the most private spaces of mind and body. It was in my first year of college that I read Adrienne...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT