Rigorously describe the authentication and permissions methods you use when you
ID: 3581471 • Letter: R
Question
Rigorously describe the authentication and permissions methods you use when you are in your house and you receive a knock at your door. Explain how you would navigate several scenarios, such as: receiving a friend you were expecting, girl scouts selling cookies, your postal worker delivering a package, a police officer, and a stranger late at night when you are expecting a friend to visit. How do you authenticate these people? What permissions do you give them? What possibilities, if any, do you see for these methods to be subverted? What similarities, if any, do you see to the technical protocols discussed in this chapter?
Explanation / Answer
So authentication is checking the identity of that person and permission or we can authorization means whether that identity is allowed to enter the house. For e.g. you hear a knock at the door , you will not directly open the door first you will authenticate that person asking who is it let say its your mother , then come the permission obviously your mother is allowed inside house.
Considering the given scenarios:
Receiving a friend you were expecting - yes we can authenticate friend and allow as we know the person. Girl scouts selling cookies - you can authenticate them but not authorize them to enter the house. Your postal worker delivering a package - you can authenticate him as its your regular person but not authorize to enter house. Stranger late night - Does not authenticate him or you are unknown and if not this then obviously cannot allow.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.