An online store website is looking to upgrade their systems and practices: stronger encryption for customer information, b) a system for detecting when unauthorized users are trying to access their site, and c) a way to train their staff on how to keep customer and company information more secure so they will not be a victim of cyberattack. Design a finite state machine to model the identification and authentication process when 2-Factor Authentication is used. Identify states and state transitions. Assume that inputs are valid or invalid usernames and valid or invalid authentication factors, and outputs are messages for the user. Make sure to include explanations.
An online store website is looking to upgrade their systems and practices: stronger encryption for customer information, b) a system for detecting when unauthorized users are trying to access their site, and c) a way to train their staff on how to keep customer and company
Design a finite state machine to model the identification and authentication process when 2-Factor Authentication is used. Identify states and state transitions. Assume that inputs are valid or invalid usernames and valid or invalid authentication factors, and outputs are messages for the user. Make sure to include explanations.

Let's see about information security
This facet of information security is often referred to as protecting confidentiality. While confidentiality is sometimes mandated by law, common sense and good practice suggest that even non-confidential information in a system should be protected as well-not necessarily from unauthorized release as much as from unauthorized modification and unacceptable influences on its accessibility.
Step by step
Solved in 5 steps with 1 images









