Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Write review about this article with references in APA format

In our world today, one cannot deny the impact that the Internet has on all aspects of our society and security is more thought of today during software designs. Two-factor authentication is mostly based on the concept of something you know, something you have, something you are and where you are.

Two-factor authentication also known as 2FA is one of the greatest means of improving an online security account. Fortunately, most websites have adopted this new security measure and it has become a lot more common on the web today, adding an extra layer of security to our accounts online. Incorporating any of these two methods together will provide a higher level of security to a website or software, making compromise harder.

Using a password in combination with images and games can help strengthen the security of a website but care should be taken when combining authentication types that are not common because of user rejection.

This goes back to the CIA triad where an increase in one could affect the other. Our objective is simply to permit the right amount of security. But more security features will almost always influence the ease of use. To provide a true dependable two-way authentication between humans and computers a CAPTCHA is a wildly accepted method. By combining CAPTCHA with other forms of authentication, true human authentication can be achieved.

A middleperson attack simply is like listening in on a conversation between two systems. When information is sent from a system to a server or website, anyone along the path of that information such as an ISP can be able to intercept that information or even modify it. Detecting a middleperson attack can be very difficult and the best solution is preventing it.

The most common solution is the use of VPNs which provides encryption for your data passing through your ISP. On the down side, if you are using a commercially available or paid VPN service, they too can be able to employ a middleperson attack. The best solution to middleperson attack will be end-to-end encryption.

This method is the best but also not feasible on all websites since we cannot implement encryption on systems we do not own. In the book of Proverbs 25:2 it says, "It is the glory of God to conceal a thing: but the honor of kings is to search out a matter".

References Anderson, R.J. (2008). Security Engineering: A Guide to Building Dependable Distributed Systems (2nd ed.). Hoboken, NJ: Wiley. ISBN: 9780470068526. Two-factor authentication. (2007, October). Database and Network Journal, 37(5), 26.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92771396
  • Price:- $10

Priced at Now at $10, Verified Solution

Have any Question?


Related Questions in Computer Engineering

About signed integer representation twos complement

About Signed Integer Representation. Two's Complement Overflow Explain how to perform the signed decimal to Hexadecimal conversion and vice versa. Show it with two examples for each.

Discuss the importance of using an access control model in

Discuss the importance of using an access control model in determining how employees in an organization should gain access to resources.

Suppose that you want an operation for the adt list that

Suppose that you want an operation for the ADT list that adds an array of items to the end of the list. The header of the method could be as follows. public void addAll(T[] items) Write an implementation of this method f ...

Question search scholargooglecom for a company school or

Question: Search "scholar.google.com" for a company, school, or person that has been the target of a network or system intrusion? What information was targeted? Was the attack successful? If so, what changes were made to ...

Question interface design models please respond to the

Question: "Interface Design Models" Please respond to the following: • Evaluate interface design models and describe design issues across human-computer interaction environments associated with these models. Support your ...

Short answer1 what is the difference between a logic error

Short Answer 1. What is the difference between a logic error and a syntax error? 2. Define and discuss the difference between unary, binary and ternary operators. Give an example of each. 3. When must you use curly brace ...

A simple substitution cipher can be created by shifting a

A simple substitution cipher can be created by shifting a letter n positions in alphabetic order. For example, if the possible characters are the list [A...Za...z], a shift of three would translate A to D and Z to c. The ...

In a survey of 100 people 40 were casual drinkers event d

In a survey of 100 people, 40 were casual drinkers (event D), and 60 did not drink (event D). Of the ones who drank, 6 had minor headaches. Of the non-drinkers, 9 had minor headaches. Let D represent set of surveyed peop ...

Question 1two variables have a negative non-linear

Question 1 Two variables have a negative non-linear correlation. Does the dependent variable increase or decrease as the independent variable increases? A)Dependent variable would remain the same B)Dependent variable inc ...

Enter probability as a fraction or as a decimal rounded to

Enter probability as a fraction or as a decimal rounded to nearest thousandth (three A basket contains six red and four blue marbles. Three marbles are drawn at random without replacement. (WITHOUT using combinations) de ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As