Question

Implementation of User's Authentication and Authorization. What network technology are you planning to implement user's authentication...

Implementation of User's Authentication and Authorization. What network technology are you planning to implement user's authentication and authorization by application? Where in the network would reside such functionality?

Homework Answers

Answer #1

Ans). Well, there are many phases where a possible breach can occur.

--> Firstly, to avoid key loggers attack, we can use virtual keyboard and disable keystroking.

--> Now, to send the password over the channel for authentication, we must encrypt it. We'll use RSA cipher for that to avoid key exchange problems.

--> On the server side also, we must store only hash values of the passwords and the whole passwords as plaint text. In case of plain texts, any successful attack on servers would disclose all login credentials. We should hash passwords and store only hash values at server.

--> when someone requests for authentication, hash value of input password is checked with the one stored at servers.

--> To avoid brute force attack, we can include max wrong tries limit and captcha.

Hope it helped! Feel free to ask any doubt in comments. Don't forget to upvote if it helped :).

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Network security implementation can be explained with any of the following, except one. Justify your choice....
Network security implementation can be explained with any of the following, except one. Justify your choice. Network security implementation is the act of designing, installing, deploying, and configuring network security. Confidentiality, integrity, availability, privacy, authentication, authorization, nonrepudiation, and accounting are common security goals in network design and defense in depth. A significant portion of network security is about making the right technology choices without falling into easy traps or defaults—hence, it is notable that Internet Protocol Version 4 (IPv4) typically...
You have the opportunity to design the patient privacy authorization form(s) What are the steps in...
You have the opportunity to design the patient privacy authorization form(s) What are the steps in planning the forms(s)? What specific types of release of information need to be covered?
what network access technology would be most suitable for providing internet access in rural areas ?
what network access technology would be most suitable for providing internet access in rural areas ?
Suppose you have decided to implement VLANs as a solution for slow network performance on the...
Suppose you have decided to implement VLANs as a solution for slow network performance on the company network depicted in Figure 10-25. You want two VLANs, one for the Manufacturing Department and one for the Administrative Department. Employees on all three floors of the building work in each department, as shown in the figure. You are authorized to purchase up to four programmable switches to replace existing switches, and you are not authorized to purchase a new router. The current...
Overview Your assignment is to complete a wireless network design for a small company. You will...
Overview Your assignment is to complete a wireless network design for a small company. You will place a number of network elements on the diagram and label them appropriately. A network diagram is important to communicate the design features of a network between network administrators, system administrators and cyber-security analysts. It helps to create a shared mental model between these different technologists, yet each will have their own perspective on what is important to have documented on the diagram. Please...
12)A mid-sized company has decided to implement an enterprise resource planning (ERP) system, and management suspects...
12)A mid-sized company has decided to implement an enterprise resource planning (ERP) system, and management suspects that many of its employees are concerned about the planned implementation. Managers are considering holding informational workshops to help decrease anxiety levels among employees. To determine whether such an approach would be effective, they randomly select 16 employees to participate in a pilot workshop.  These employees were given a questionnaire to measure anxiety levels about ERP before and after participating in the workshop. To determine...
Identifying a business problem or opportunity and proposing a technology solution. You will need to identify...
Identifying a business problem or opportunity and proposing a technology solution. You will need to identify a real-life business that you are familiar with. The business must have a problem or an opportunity that can make use of an information technology solution. Select a technology category that will serve as a solution for the problem or opportunity you have identified for the selected business. For the purposes of this project, it is important to differentiate between a technology solution category...
1)Why do you think it is so difficult to find successful ERP implementation? 2. How do...
1)Why do you think it is so difficult to find successful ERP implementation? 2. How do you think cloud computing will help ERP implementations find success? 3. What advice would you give a company deciding to implement an ERP system? 4. How can integrating SCM, CRM, and ERP help improve business operations at your school?
Selecting an Implementation We have studied arrays, vectors, and linked lists. Say which you would use...
Selecting an Implementation We have studied arrays, vectors, and linked lists. Say which you would use to implement each situation below. Defend every answer by saying why the answer you chose is better than the other two possibilities. A list of participants at a large public hearing. As each person arrives, their name is entered into the system, where it is appended to the end of the list. Thermometer readings at a weather station. The temperature is recorded every 5...
Assuming you were using excel software to implement the database, what architecture would you plan for...
Assuming you were using excel software to implement the database, what architecture would you plan for the company and why?