Free Sample: Design a Multi-Factor Authentication Process paper example for writing essay

Design a Multi-Factor Authentication Process - Essay Example

Multi-factor authentication and restrictions based on data types and sensitivity as discussed in previous labs are major considerations for this research when investigating RADIUS, Attach+ and WALL authentication methodologies. Lab Assessment Questions & Answers 1 . In an Internet Banking Financial Institution is Single Factor Authentication acceptable? Why or why not? Yes it can be acceptable because you can buff up security elsewhere. 2. Explain the difference between Positive Verification and Negative Verification? Negative verification is the opposite of positive verification, whereby the customer just contact the bank to verify that the information is correct. 3. What vulnerabilities are introduced by implementing a Remote Access Server?

Is combining authentication and authorization a less or more robust way of Based on Remote Access and Data Sensitivity Learning Objectives and Outcomes Upon completing this lab, the students will be able to complete the following tasks: Identify solutions for remote access using PKZIP according to defined access controls and data classification standard requirements Design a layered remote access PKZIP solution that is based on the type of user and the type of data being accessed Compare and contrast PKZIP solutions for identification, authentication and authorization from security operations and management perspectives Identify the strengths and weaknesses within each type of encryption after a thorough comparison and analysis of pros and cons Align secure remote access protocols (IP- SEC, VPN, TLS, SSL, SSH, etc. With different business application requirements and PKZIP capabilities Assessment Worksheet Align Appropriate PKZIP Solutions Based on Remote Access and Data Sensitivity The student will research several PKZIP concepts and solutions that are based on the s it relates to remote access rights on classified data, based on the role of the user and the sensitivity of the data. The student will also review how to integrate PKZIP authentication into such technologies and protocols as IP-SEC, VPN, SSL and others, while taking into consideration both the private and public sector organizations. After creating the written analysis of encryption methods evaluating their benefits, roles and limitations, answer these assessment questions. 1 .

Where can you store your public keys or public certificate files in the public domain? Is this the same thing as a Public Key Infrastructure (SKI) server? . What do you need to do if you want to decrypt encrypted messages and files from a trusted sender? 3. When referring to Pipes Tunnel Mode, what two types of headers are available, and how do they differ? 4. Provide a step by step progression for a typical Certificate Enrollment process with a Certificate Authority. 5. When designing a PKZIP infrastructure what are the advantages and disadvantages of making the CA available publicly over the Internet or keeping it within the private network? 6. Designing a PKZIP involves several steps.

Per the Windows Best Practices for Designing a PKZIP, what are those steps? In your own words, explain what each step is meant to do. 7. When deploying a PKZIP, it is important to understand how many CASE will be necessary to properly implement the infrastructure. Provide 3-5 important considerations that must be taken into account before deploying a PKZIP for a large environment. 8. What is the main function of the certitude. Exe command line tool available in Microsoft Windows? 9. What is the Opens project and their mission? 10. What is the purpose of Single Sign-on? Provide one example of how it benefits security and one example as to how it can increase security risk.