writerschalet

HOMEWORK GUIDE | NA15 Computer Science Discussion Paper

NA15 Computer Science Discussion Paper

Pls answer below 2 questions in a saperate WORD Doc

Write My Essay: Instant Help With Assignments

Submit a "do my paper" request and proceed to do whatever your heart desires.

Get Help Now!

Task 1-

Discussion: Smart Card versus Authenticator App:

The Personal Identity Verification (PIV) card is used in non-military government agencies for authentication and identification to gain access to systems, networks, and online resources. These cards, in combination with a personal identification number, meet two-factor requirements. PIV credentials also are designed to help reduce counterfeiting and are tamper-resistant.

An authenticator app, such as Google Authenticator, is another method to achieve two-factor authentication. It is a free app available for installation on mobile devices.
The U.S. federal government authorizes the use of PIVs as well as authenticator apps, depending on the circumstances.
Answer the following question(s):
In what type of situation would an authenticator app provide adequate two-factor authentication for federal government use? Provide rationale or a citation for your answer.
In what type of situation would a PIV be required for federal government use? Provide rationale or a citation for your answer.
Fully address the questions in this discussion; provide valid rationale or a citation for your choices; Initial post should be at least 350 words in length.

———————————————————————————————————-

Task 2-

Discussion: Resistance Behavior:

Users who see security as an obstacle or a nuisance are less likely to abide by security policies. Referred to as “resistance behavior,” a Virginia Tech study found that even if people understand that a security breach can have severe consequences on an organization, that knowledge does not always make users accept and conform to security policy rules. Individuals may feel their competence challenged, which triggers a negative attitude toward security in general. Users may also view some security controls, such as scheduled password changes, as unnecessary interruptions. Security controls, such as a fingerprint scanner, that don’t work consistently may make users feel overwhelmed and lead to mistrust of security controls or even overriding them.
Answer the following question(s):
If you were a professional in charge of security for an organization, what would you say to a user who believes they have the right to decide whether to participate in security measures?
In the same scenario, what kind of incentive do you think would encourage the user to participate?
Fully address the questions in this discussion; provide valid rationale or a citation for your choices. Initial post should be at least 350 words in length.

Requirements: specified in question

The post NA15 Computer Science Discussion Paper appeared first on Critical Assignment.

Get Help for All Your Academic Writing Assignments. We are here to make your academic life more successful and less stressful. Over 10 years, we deliver the promised services. Think wise, buy custom essay! Just tell us “Quickly write my essay!” and provide us with the details of the order and instructions – we will make sure it will be completed on time by our professional writing team

Are you finding it difficult to write your essays, research papers or term papers. Hold on – expert help is on the way!

PLACE YOUR ORDER