Business > CASE STUDY > ISSC680 Wk1.docx ISSC680 Week 1 Homework ISSC680 Week 1 Homework Information Securit (All)
ISSC680 Wk1.docx ISSC680 Week 1 Homework ISSC680 Week 1 Homework Information Security is one of the foundations of the CIA triad, propping up the pillars of confidentiality, integrity, and avail... ability. A course of action to do this, as well as provide a form of risk management, is to implement two-factor authentication. Two-factor authentication, also referred to as 2FA, is the combination of using two authentication methods to allow a user access to a system. These authentication methods normally fall into one of three categories: 1. Something you know, such as a custom password 2. Something you have, such as an RSA token or chip enabled ID card 3. Something you are, such as a fingerprint or retina 2FA is normally implemented to œto enhance resilience of password-based authentication by requiring users to provide an additional authentication factor (Reynolds et al., 2014). Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [Show More]
Last updated: 2 years ago
Preview 1 out of 2 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Jul 22, 2021
Number of pages
2
Written in
This document has been written for:
Uploaded
Jul 22, 2021
Downloads
0
Views
35
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·