Assume you've been named Chief Security Officer (CSO) of a company that deals with highly sensitive and classified information. Because the materials are so sensitive, only authorised people should have access to this facility. Unauthorized access could pose a serious threat to national security. This facility is very new, and there is currently no automated information technology-based authentication mechanism in place. The first assignment you were given after being appointed as CSO was to build an IT-based identification system that checks a person's identity when he or she wishes to use the facility. Propose and describe an authentication system that can be used to verify employees and allow only those personnel with proper access rights to access classified resources. Please keep in mind that single factor authentication may not be sufficient.
Assume you've been named Chief Security Officer (CSO) of a company that deals with highly sensitive and classified information.
Because the materials are so sensitive, only authorised people should have access to this facility.
Unauthorized access could pose a serious threat to national security.
This facility is very new, and there is currently no automated information technology-based authentication
The first assignment you were given after being appointed as CSO was to build an IT-based identification system that checks a person's identity when he or she wishes to use the facility.
Propose and describe an authentication system that can be used to verify employees and allow only those personnel with proper access rights to access classified resources.
Please keep in mind that single factor authentication may not be sufficient.
Step by step
Solved in 4 steps