A hypothetical scenario where the management of login credentials is necessary could be a large corporation with multiple departments and employees. In order to ensure the security and privacy of sensitive information, each employee would need to have their own unique login credentials to access the company's database. The management team would be responsible for creating and distributing these credentials, as well as monitoring and updating them regularly to prevent unauthorised access. This would require a robust system for managing and storing login credentials, as well as strict protocols for ensuring their confidentiality and security. Identify and analyse the different authentication techniques that are currently accessible. Is the utilisation of a password mandatory in all instances?

Management Of Information Security
6th Edition
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:WHITMAN, Michael.
Chapter12: Protection Mechanisms
Section: Chapter Questions
Problem 1RQ
icon
Related questions
Question

A hypothetical scenario where the management of login credentials is necessary could be a large corporation with multiple departments and employees. In order to ensure the security and privacy of sensitive information, each employee would need to have their own unique login credentials to access the company's database. The management team would be responsible for creating and distributing these credentials, as well as monitoring and updating them regularly to prevent unauthorised access. This would require a robust system for managing and storing login credentials, as well as strict protocols for ensuring their confidentiality and security. Identify and analyse the different authentication techniques that are currently accessible. Is the utilisation of a password mandatory in all instances?

 

Expert Solution
steps

Step by step

Solved in 4 steps

Blurred answer
Knowledge Booster
Concurrency control
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Management Of Information Security
Management Of Information Security
Computer Science
ISBN:
9781337405713
Author:
WHITMAN, Michael.
Publisher:
Cengage Learning,