Assignment-4:
based on what presented in class, and extra research you conduct: 
 Choose an Information System as a use case. You can use your personal computer or smart phone. 
 Describe an identification mechanism, and how you would implement it to the

computer science

Description

here. keep the words short. last time he's said it was too word. just make sure you answer all the questions. here comments from the professor the work you did ."comments , no clear or idea . doesn't answer questions " this was the last work you did for me. he also he ask for implementation not definitions . try to keep than less than 5 pages Assignment-4:
based on what presented in class, and extra research you conduct: 
 Choose an Information System as a use case. You can use your personal computer or smart phone. 
 Describe an identification mechanism, and how you would implement it to the system defined above. 
 List all authentication mechanisms, you learned in class, and how you would implement them into the system defined above. 
 Develop criteria for passwords that is mandatory for users of the system. Such that a user needs to provide mixture of alphanumeric and special character passwords. So is to have users use strong passwords. 
 Design a concealment policy for your system. Describe how salt can be implemented. 
 How would you implement security questions? 
 Describe how you can implement tokens to your systems? 
 How federated identity management and single sign-on is can be implemented into your 
systems? 


Instruction Files
cn.docx
90.6 KB

Related Questions in computer science category


Disclaimer
The ready solutions purchased from Library are already used solutions. Please do not submit them directly as it may lead to plagiarism. Once paid, the solution file download link will be sent to your provided email. Please either use them for learning purpose or re-write them in your own language. In case if you haven't get the email, do let us know via chat support.