Explain the threat in each of the types of authentication


Scenario Assignment

For the Module Three assignment, students will be provided multiple scenarios that contain hypothetical situations pertaining to authentication and security protocols. Each of these situations will require the student to critically assess the situation and propose appropriate actions to be taken. This allows students to make practical application of the knowledge gained pertaining to authentication protocols, which will assist in the development of statements of policy for the information assurance plan.

Prompt: Explain the threat in each of the following types of authentication and provide a solution for each scenario below:

- Alice sends a password, and Bob compares it against a database of passwords.

- Alice sends a password, and Bob hashes it and compares it against a database of hashed passwords.

- Alice computes the hash of a password and uses it as secret key in challenge/response protocol.

- Alice computes the hash of a password and sends it to Bob, who hashes it and compares it against a database of doubly-hashed passwords.

Format your assignment according to the following formatting requirements:

1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

2. The response also includes a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.

3. Also include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.

Solution Preview :

Prepared by a verified Expert
Management Information Sys: Explain the threat in each of the types of authentication
Reference No:- TGS03022896

Now Priced at $30 (50% Discount)

Recommended (94%)

Rated (4.6/5)