Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Based on the following diagram (Unit 4 course material, pg 38), provide an examp

ID: 3707544 • Letter: B

Question

Based on the following diagram (Unit 4 course material, pg 38), provide an example for each level of the pyramid security authentication method given. Use diagram to explain your answer Pyramid of Authentication Technologies Higher level of security offered For highly valued PKI Plus biometrics Users privabe key is kept in a device such as a smart card Biometrics are also used o protect key Signature User's private key is stored on a portable computes device such as a disk. Certificate-PK Digital Signature Certificate-PGP User name and password authenticates er-Pretty Good Privacy encrypts data. User name and password authenticates ner- Secure Socket Layer saftware encrypts data. Lower level of Password+SSL security offered. For less valuable User name and password authenticates user without any lokens are Figure 4.21 Pyramid of authentication technologies Source: Commonwealth of Australia 2012, http://www.archive.dbcde.gov.au/2009/ may/trusting the internet- a small business guide to e-security/how_do e- security technologies work

Explanation / Answer

Answer)

As per the above diagram below are the examples:

1) Password/Tokens: The client application requests the access token with the help of username and password and directs it to the sales force to verify the credentials.

2) Password + SSL: Password used in Ubuntu server. A passphrase is used to encrypt the secret key.

3) Digital Signature Certificate + PGP: The digital signature used in Adobe Acrobat which verifies the signer’s identity with the help of signer’s public key to decrypt the document hash.

4) Digital Signature Certificate and PKI: This is the highest level of security. The PKI generates 2 long numbers called as key one being public and the other private. This needs a CA to save it with security. Example: DocuSign

5) PKI + Biometrics: These days even the mobile device uses the PKI and biometrics for authorization. Even the smart cards being used by the several Organization also contains this kind of security techniques. Example: ICICI Bank Mobile App.

Hope this answer helps.:) Happy to help.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote