Authentication methods with a multi-factor


The CIO at your organization wants you to assess a plan to replace the current username/password authentication methods with a multi-factor authentication approach that requires users to use a smart card and enter a PIN to access any computing system. Aside from the issue of cost, assess three downsides to this approach.

Name four authentication policies that can be enforced using technology and four authentication policies that cannot be enforced using technology. Discuss the reasons why the second for policies can't be enforced using technology and how managers could attempt to assure compliance.

Request for Solution File

Ask an Expert for Answer!!
Computer Engineering: Authentication methods with a multi-factor
Reference No:- TGS0541875

Expected delivery within 24 Hours