Describe a remote access and wireless connection policy and the use of role-based authentication.  Include two-factor authentication in your discussion.

What will be an ideal response?

A remote access and wireless connection policy specifies the use of role-based authentication,
which gives users limited access based on their assigned role in the company and the resources and applications the role is allowed to use. The sensitivity of these applications determines the type of authentication used. For example, access to applications or data sources that are not confidential can be granted with a simple password. Access to confidential resources can be secured with a smart card or token, which is a piece of hardware used with a password to provide two-factor authentication. This type of authentication requires a combination of identifying a physical property of the user, such as fingerprints, a signature, or a retina scan; identifying a physical item such as a card or token; or using known information such as a password or PIN. Any two of these factors combined qualify as two-factor authentication.

Computer Science & Information Technology

You might also like to view...

The ___ Auto Fill Option that fills the destination area using the format of the source area; no content is filled

Computer Science & Information Technology

A common date format for a letter is, as an example, July 4, 2018

Indicate whether the statement is true or false

Computer Science & Information Technology