Question

Implementation of User's Authentication and Authorization. What network technology are you planning to implement user's authentication...

Implementation of User's Authentication and Authorization. What network technology are you planning to implement user's authentication and authorization by application? Where in the network would reside such functionality?

Homework Answers

Answer #1

Ans). Well, there are many phases where a possible breach can occur.

--> Firstly, to avoid key loggers attack, we can use virtual keyboard and disable keystroking.

--> Now, to send the password over the channel for authentication, we must encrypt it. We'll use RSA cipher for that to avoid key exchange problems.

--> On the server side also, we must store only hash values of the passwords and the whole passwords as plaint text. In case of plain texts, any successful attack on servers would disclose all login credentials. We should hash passwords and store only hash values at server.

--> when someone requests for authentication, hash value of input password is checked with the one stored at servers.

--> To avoid brute force attack, we can include max wrong tries limit and captcha.

Hope it helped! Feel free to ask any doubt in comments. Don't forget to upvote if it helped :).

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
You have the opportunity to design the patient privacy authorization form(s) What are the steps in...
You have the opportunity to design the patient privacy authorization form(s) What are the steps in planning the forms(s)? What specific types of release of information need to be covered?
what network access technology would be most suitable for providing internet access in rural areas ?
what network access technology would be most suitable for providing internet access in rural areas ?
Overview Your assignment is to complete a wireless network design for a small company. You will...
Overview Your assignment is to complete a wireless network design for a small company. You will place a number of network elements on the diagram and label them appropriately. A network diagram is important to communicate the design features of a network between network administrators, system administrators and cyber-security analysts. It helps to create a shared mental model between these different technologists, yet each will have their own perspective on what is important to have documented on the diagram. Please...
12)A mid-sized company has decided to implement an enterprise resource planning (ERP) system, and management suspects...
12)A mid-sized company has decided to implement an enterprise resource planning (ERP) system, and management suspects that many of its employees are concerned about the planned implementation. Managers are considering holding informational workshops to help decrease anxiety levels among employees. To determine whether such an approach would be effective, they randomly select 16 employees to participate in a pilot workshop.  These employees were given a questionnaire to measure anxiety levels about ERP before and after participating in the workshop. To determine...
1)Why do you think it is so difficult to find successful ERP implementation? 2. How do...
1)Why do you think it is so difficult to find successful ERP implementation? 2. How do you think cloud computing will help ERP implementations find success? 3. What advice would you give a company deciding to implement an ERP system? 4. How can integrating SCM, CRM, and ERP help improve business operations at your school?
Assuming you were using excel software to implement the database, what architecture would you plan for...
Assuming you were using excel software to implement the database, what architecture would you plan for the company and why?
Selecting an Implementation We have studied arrays, vectors, and linked lists. Say which you would use...
Selecting an Implementation We have studied arrays, vectors, and linked lists. Say which you would use to implement each situation below. Defend every answer by saying why the answer you chose is better than the other two possibilities. A list of participants at a large public hearing. As each person arrives, their name is entered into the system, where it is appended to the end of the list. Thermometer readings at a weather station. The temperature is recorded every 5...
what policy mix would you advise your president to implement to solve umemployment and inflation
what policy mix would you advise your president to implement to solve umemployment and inflation
You are assigned as a staff auditor for a high growth technology company that is in...
You are assigned as a staff auditor for a high growth technology company that is in the process of planning for an IPO in 2 – 3 years. You are reviewing the sales of new technology and notice that sales growth is double digit and has increased considerably. Most of the sales occur in December (last month of the year). Management tells you that initial stock price is contingent on high sales growth. The CFO also confides in you that...
Planning for Your Retirement Where do you plan to live? What interests do you want to...
Planning for Your Retirement Where do you plan to live? What interests do you want to pursue? How much money will you need to pursue your chosen lifestyle? What do you need to do now to make your retirement plans a reality? Where you would like to retire? Research the area. What do you need to do to maintain or regain your health? What financial plans do you need to make today to live the retirement of your dreams?
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT