Nobody downloaded yet

DQ Week 2 Technology - Essay Example

Comments (0) Cite this document
Passwords are used to prevent illegal access to imperative information, user accounts, such as computer system, e-mails, financial accounts etc. and they must also ensure to provide guaranteed security of the crucial information. However, a traditional password verification system inquires the user for provision of a surreptitious sequence of characters (password) to ensure that a right person/user is getting access to his personal system…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.3% of users find it useful
DQ Week 2 Technology Essay
Read TextPreview

Extract of sample
"DQ Week 2 Technology"

Download file to see previous pages but these are too complex to apply at large group of general public. Keeping in view the above weaknesses of the traditional password system, there is an immense requirement to design an interactive password system as previously done by Tsutomu Matsumoto (1996), Michael K. Reiter (1999), Taekyoung Kwon (2000) and many other great authors of information security. However, the some interactive systems were complex, while the others were time consuming. In order to design interactive password system, we need to take strings from the user based on several questions rather than a single string password. Subsequently, we have to use the input strings in a meaningful manner and introduce randomness to develop an interactive password system. Involvement of randomness on the basis of the user’s questions might be easy for the user to remember the answers of the questions; the user will need to remember/keep the answers or rules of the questions rather than keeping a password string. ...
e the surreptitious set of rules and regulations, control the rules that would be associated to the users and subsequently, the actual login interface for the said system. The above design will not allow users to select an easy password like MS Outlook’s Password Management Protocol. As the design is based on an interaction with the user’s secret questions and an involvement of randomness makes it harder for intruders to guess the password as well as for the hacking software. Reference List Anderson, J., Ross. 2008. Security Engineering – 2nd Edition. Canada: Wiley Publishing Inc. William H. Haubert. 2002. An Interactive Approach to Secure and Memorable Passwords. University of Virginia The access controls provide a number of mechanisms to an Operating System for authentication, from which some are Java Virtual Machine (JVM) Sandbox, Access-matrix model and proof-carrying code mechanism. These mechanisms are implemented with a composite security policy within Operating Systems for applying certain rules and restrictions to the user that are diverse based on the users’ roles and responsibilities within a company. JVM Sandbox is an access control mechanism; the JVM is used to limit the access of the user to the users’ machine resources (Operating System) by the Sandbox mechanism. Malevolent Java binaries are utilized to break the security of JVM; these are removed by the restrictions of JVM sandbox. Conversely, this security configuration can impact the performance of the machine badly. It is imperative to update JVM regularly to prevent security threats but updating security patches on each user machine may frequently makes difficulties. Access Matrix model composed of two dimensional matrixes used for defining the rights to access objects. This is used for ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“DQ Week 2 Technology Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved de https://studentshare.org/information-technology/1454440-dqweek
(DQ Week 2 Technology Essay Example | Topics and Well Written Essays - 1000 Words)
“DQ Week 2 Technology Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1454440-dqweek.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
Another similarity is that the results of the theories ensure the fulfillment of both physical and psychological needs of individuals (Baack, p. 23). In relation to the differences of the theories, the ERG theory
1 Pages(250 words)Assignment
Week 5 DQ 2
Virtual world that was once a dream, now has a purely true existence. Everyday rapid advancements in technology have made this dream come true that was once an assumed fantasy. Technology has made it possible to unfold the restricted
1 Pages(250 words)Assignment
Because of this rationalizing, a person builds a strong capacity to improve thought. The other manner to explain the significance of EI is by pondering about who the most dependable and best leaders are; the ones who during chaos react chaotically
1 Pages(250 words)Assignment
Week 8 dq
tion has been argued from a human nature or condition perspective, which in turn influenced my moral decision regarding whether elective abortion is permissible or not. In this circumstance, my values for respect and treasure of life will be based on the nature of the fetus
1 Pages(250 words)Essay
DQ Essay
The proposed queries are as follows. The answers to this question would be able to appreciate the parents interested to eliminate the monotony of the kids and this group would be concerned on ensuring a renewed joy in the minds of the children. This question is primarily aimed to understand, among the group selected for survey, who all would be concerned with the learning potential of the kids.
3 Pages(750 words)Essay
Week 7 dq
Accepting the chief’s deal would not necessarily mean that he would abide by the terms of the deal. After killing one of the prisoners as stipulated in the deal, he could as well
1 Pages(250 words)Essay
Week 8 DQ 2
To clarify, a judicial review gives or denies judicial sanction to an act passed by the majority of a legislative body and by an executive as well as a majority vote for its constitutionality. It must be noted that the Supreme Court’s power is great. It can even
1 Pages(250 words)Essay
DQ 2
For example, the transaction in this case is the purchase of a new piece of equipment for $150,000. The financing for this purchase is to be done through the acquisition of a loan. This means that there are two transactions, the acquisition of a loan and the purchase of
1 Pages(250 words)Essay
DQ week three (a)
The other way is translating and synthesizing. Research is the same as delivering of services. It contains vocabularies, which might not be understood by non researchers. Hence, there is need for
1 Pages(250 words)Essay
Refrace week 4 dq
He describes his actions in causing massive trading losses as being done in order to support that family and to ensure their future success. He traded quite aggressively which he saw as being part of the ethos and culture of UBS, and he says they would ultimately
3 Pages(750 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Essay on topic DQ Week 2 Technology Essay for FREE!
logo footer
Contact us:
Contact Us Now
FREE Mobile Apps:
  • StudentShare App Store
  • StudentShare Google play
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us