Computer Science / Security questions (2)
The CIO at your organization wants you to assess a plan to replace the current username/password authentication methods with a multi-factor authentication approach that requires users to use a smart card and enter a PIN to access any computing system. Aside from the issue of cost, assess three downsides to this approach.
Name four authentication policies that can be enforced using technology and four authentication policies that cannot be enforced using technology. Discuss the reasons why the second for policies can't be enforced using technology and how managers could attempt to assure compliance.
12 years ago
5
Answer(1)![blurred-text]()
![]()
Purchase the answer to view it

NOT RATED
- comp_science_autosaved.doc
other Questions(10)
- HCA 240 Week 9 Disease Trends and the Delivery of Health Care Services
- Supply Chain Management Assignment
- computer science
- AS SOON AS POSSIBLE.....
- Case Analysis
- NTC 362 Week 2 Individual INDP, Part 1
- NEW YORK BOUTIQUE_Financial Statements
- PSY 428 Week 2 Productive & Counterproductive Behavior / UoP
- BUSI-320 Corporate Finance-2013 Fall-B assignment- 4
- math2