Discuss the algebra of authentication and its implications for privacy. That is, assume a situation with two-factor authentication, and call the factors A and B. Consider the four cases in which each one is strong or weak. What conclusions would you draw about the results: weak A and weak B; weak A and strong B; strong A and weak B; strong A and strong B? Does order matter? Does it matter if both
factors are of the same type (what you know, what you have, what you are)? What happens if you add a third factor, C?
What will be an ideal response?
Two
weak
factors
will
provide
weak
protection.
Two
strong
factors
will
provide
strong
protection,
and
likely
more
so
if
they
are
of
different
types
(i.e.,
if
someone
can
steal
something
you
have,
that
person
can
likely
also
steal
a
second
thing
you
have).
One
weak
factor
and
one
strong
factor
provide
similar
protection
to
strong
one-?factor
authentication,
regardless
of
order.
Adding
more
factors
does
improve
protection,
particularly
if
they
are
of
different
types.
You might also like to view...
The ________ view is used to create or modify the design of an object
Fill in the blank(s) with correct word
Case-Based Critical Thinking QuestionsCase 2Libby is designing a new form in Access 2013. She has just figured out how to use form events to maximum advantage in the design of her new form. Libby knows that users of her form are also using numerous other dialog boxes and windows from other applications at the same time, just by nature of her application. When they return to her form and make it the active window, she would like to display a message. Which event will allow Libby to present this message to the user?
A. On Focus B. On Load C. On Activate D. On Click