Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / The discussion assignment requires an Original Posting (main post) from you of 2-3 paragraphs answering the module's question List of topics for discussion

The discussion assignment requires an Original Posting (main post) from you of 2-3 paragraphs answering the module's question List of topics for discussion

Computer Science

The discussion assignment requires an Original Posting (main post) from you of 2-3 paragraphs answering the module's question

List of topics for discussion. Choose ONE of the below.

1. Explain the elements of authentication. Make sure to include a description of the three basic authentication factors.

2. Contrast authentication and authorization. Give specific examples of each.

3. Describe biometrics and how biometrics are used in the authentication. Include your personal experience with biometric authentication. Does your organization use biometric systems?

4. Discuss two-factor authentication, give an example where it is used, and explain how it improves security.

Respond to your classmates with your point of view on their answers, offering constructive feedback. Make sure your opinion is substantiated with valid reasons and references to the concepts covered in the course. In addition, engage in discussions with the students who comment on your answer. It is expected that you apply critical thinking in your posts by expanding the discussion, not just agreeing with each other.

Respond to all 3 peers

 

Peer 1:

 

D5-Jude Authentication Vs Authorization

COLLAPSE

What is authentication? Authentication is the process of verifying someone's identity.Authentication normally takes place by checking a password, a hardware token, or some other piece of information that proves identity. (“What is authentication? | Cloudflare”) Just as an airline worker checks a passport or an identification card to verify a person's identity when they board a plane, computer systems need to be sure a person really is who they say they are. At an airport, this authentication process ensures only people with a ticket get on the plane; for digital systems, this ensures data is viewed and used by the right people.” (“What is authentication? | Cloudflare”)

Authentication does not just apply to verifying human users. Computer systems also need to check servers, software, and other computers to be sure they are who they "say" they are.” (“What is authentication? | Cloudflare”)

What is the difference between authentication and authorization?

The authentication is concerned with verifying identity while authorization is concerned with permissions, or what someone is allowed to do once they gain access to a protected system or resource.

Suppose Bob works in his company's marketing department. Bob enters his password, scans his face, and inserts his hard token to log in to his company's network. At this point, authentication is complete.

After logging in, Bob does not have access to every data file in the company's possession. Authorization determines what Bob can and cannot see. As a marketer, he is authorized to see some data, like a list of potential customers to whom the company will send marketing messages, but not other data, like the company's main codebase or its list of employee salaries.

Source: What is authentication? | Cloudflare

Peer 2:

D5 Ben Alberti - Biometrics

COLLAPSE

Biometrics uses characteristics of our bodies as a sort of password to unlock our devices. They are most common among smartphones, but also exist in other systems such as laptops, or to secure rooms in high-security locations. Apple's FaceID was first released about five years ago and is now considered the norm for the company, as they are continually updating and improving its accuracy. Besides faces, the other very popular biometric is fingerprints, which have been used for decades in security, and have been a staple in crime scene analyses used to identify people.

How they work can vary from system to system, however the initial sample used to compare future attempts to is taken and digitized. Then, all further attempts will also be digitized and compared to the initial sample given. There are no black-and-white answers usually, as there will always be some variance from the mean based on a multitude of external factors, and over time the system needs to be continually tweaked. Over time and many attempts, it can become very accurate with little false acceptances/false rejections.

 

Peer 3:

Biometrics

COLLAPSE

So I have an iPhone but I never understood why Apple took out the fingerprint scanner. Is it because of it taking up to much space, or money? It's probably to create a path for more innovative tech to blossom in the hands of more people. I never researched it but I'm curious, can people use other parts of their bodies for biometrics? Like elbows or scars or a certain pattern of blemishes on their body.

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE