uestion 4 Based on the following dl agram , provide an example for each level of
ID: 3718956 • Letter: U
Question
uestion 4 Based on the following dl agram , provide an example for each level of the pyramid security authentication method given. Use diagram to explain your answer. Pyramid of Authentication Technologies Higher level of security offered. For highly valued information. PKI Plus biometrics User's private key is kept in a device such as a smart card. Biometrics are also used to protect key. Digital Signature Certificate-PK User's private key is stored on a portable computer device such as a disk. Digital Signature Certificate -PGP User name and password authenticates user -Pretty Good Privacy encrypts data. User name and password authenticates user -Secure Socket Layer software encrypts data. Password+SSL Lower level of security offered. For less valuable information. User name and password authenticates user without any encryption. Tokens are used as a second factor of authentication. Password/Tokens This file is licensed under the Creative Commons Attribution-NonCommercial 3.0 Unported license. Figure 4.21 Pyramid of authentication technologies Source: Commonwealth of Australia 2012, http://www.archive.dbcde.gov.au/2009/ may/trusting_the_internet_-_a_small_business_guide_to_e-security/how_do e- security technologies_workExplanation / Answer
Answer)
The pyramid of authentication technologies are defined as below.
The examples are as below:
1) Password/Tokens: The client application requests the access token with the help of username and password and directs it to the sales force to verify the credentials.
2) Password + SSL: Password used in Ubuntu server. A passphrase is used to encrypt the secret key.
3) Digital Signature Certificate + PGP: The digital signature used in Adobe Acrobat which verifies the signer’s identity with the help of signer’s public key to decrypt the document hash.
4) Digital Signature Certificate and PKI: This is the highest level of security. The PKI generates 2 long numbers called as key one being public and the other private. This needs a CA to save it with security. Example: DocuSign
5) PKI + Biometrics: These days even the mobile device uses the PKI and biometrics for authorization. Even the smart cards being used by the several Organizations also contains this kind of security techniques. Example: ICICI Bank Mobile App.
Hope this answer helps. :) Happy to help.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.