Description of this paper

Computer Science / Security questions (2)




The CIO at your organization wants you to assess a plan to replace the current username/password authentication methods with a multi-factor authentication approach that requires users to use a smart card and enter a PIN to access any computing system. Aside from the issue of cost, assess three downsides to this approach.;Name four authentication policies that can be enforced using technology and four authentication policies that cannot be enforced using technology. Discuss the reasons why the second for policies can't be enforced using technology and how managers could attempt to assure compliance.


Paper#71649 | Written in 18-Jul-2015

Price : $22