Describe a hypothetical situation where login credentials need to be managed. List many authentication techniques. Do you understand the purpose of a password?

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question
Describe a hypothetical situation where login credentials need to
be managed. List many authentication techniques. Do you
understand the purpose of a password?
Transcribed Image Text:Describe a hypothetical situation where login credentials need to be managed. List many authentication techniques. Do you understand the purpose of a password?
Expert Solution
Step 1

The solution to the given question is:

INSPECTION

Scenario management is a very effective way to manage multiple futures and develop finely tuned scenarios for a given situation.

Practical initiatives use scenario management to support strategic planning , product development , technology management and regional development.

EXPLANATION

Provides a fictious picture of login control. Defines multiple authentication methods. Could it be that the password out of date?

Password authentication has become a negative factor in customer retention.

Bad password management is a huge help to cybercriminals.

Password less authentication can improve customer experience, reduce costs and increase security.

The platform sector is transforming the relationship between businesses and their customers.

Businesses must communicate effectively and quickly with their customers to provide services and products that meet their needs and requirements.

The strategy of the enterprise of the future must include human verification to ensure fast and fruitful interactions with the enterprise.

Password based consumer authentication was originally intended for employees , not customers or consumers.

User experience did not a cause any problems. Today's customer's expect a seamless customer experience thanks to fingerprint scanners and facial recognition.

Passwords are becoming an increasingly important factor in low customer retention rates.

Besides , passwords management cost millions of dollars each year from implementation to reset and retirement.

From a cybersecurity perspective , poor password management is essential to the entire criminal ecosystem.

Passwords are difficult to protect, and most cyber intrusions are caused by weak or stolen passwords.

A single platform hack could affect millions of people and affiliates.

A credential stuffing attack occurred in 10 login attempts at a major retail website that redirects and distributes stolen credentials online by scammers.

Trust in digital technology is essential to maximizing opportunities in the platform economy.

The World Economic Forum on Cybersecurity aims to ensure a secure digital future for all by improving authentication , the cornerstone by cybersecurity.

 

The World Economic Forum and FIDO Alliance have published a white paper titled Passing Password less Certification:

The Next Breakthrough in Secure Digital Transformation, which outlines six key principles for a password less future.

Enhanced User Experience:

Authentication is an entry point for Internet services. Passwordless authentication mimics the way people identify each other in the real world, using approaches such as biometrics that are based on our innate physical characteristics or who we are.

It is customer centric and eliminates problems such as the common difficulty of entering complex passwords on a foreign keyboard.

In the near future , users will be able to authenticate themselves on any platform using any device they carry anywhere.

Users are much less likely to skip complex tasks when improving user interfaces that improve security.

Strong Security:

On the Dark Web, banking and social media logins are available for around $7.

It's not just an issue with someone whose identity has been stolen. The rise in uncontrollable digital crime is taking cybercrime around the world to new heights and undermining government trust.

The Internet economy is also creating a new wave of serious organized crime.

Pass's wordless authentication eliminates a wide range of channels including credentials and phishing attacks.

Enterprises use new authentication methods to reduce exposure to data breaches.

Pass's wordless solution eliminates the need to store or transmit personal information over the internet , greatly reducing the risk of online fraud and identity theft.

Also , most wordless authentication uses two different authentication factors to provide stronger security than a single password.

Enhanced Interoperability:

The interoperability of authentication systems realizes value. Interoperability allow new users to access certain services , existing users to operate on a larger scale , and digital services to offer customers new types of transactions.

The standard method assumes most of the work is done, allowing service provides to start the wordless authentication process faster.

Significantly reduces development time and provides access to new markets for proven solutions.

Simplifies international compatibility and development. 

Regulations such as GDPR affect European user companies regardless of where they are registered.

The wordless certification of the pass ensures compliance with international regulations essential to expanding your digital business worldwide.

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Database Functions
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education