SlideShare a Scribd company logo
The necessary privacy of a client ID and secret passcode is
becoming difficult nowadays to secure our most sensitive data.
Phishing, malware, and trojan virus are some of the most
occurred security threats, to overcome these, we will need to
keep our authentication layers to be more secured.
This research paper supports Multi-factor authentication due to
its more secured layer features and functionality compared to
that of Single factor authentication.
Security teams have the option to select between two
authentications factors:
· Single-factor authentication
· Multi-factor authentication
Choosing what's best for your company requires careful thought
of the advantages and disadvantages of each approach. The two
are not fundamentally unrelated; you can have both or one can
be used.
Multifactor authentication uses a strategy of two or more levels
of authentication evidence to prove the identification of a user
trying to access a system that includes password, OTP (One-
time-password), data of birth, etc.
Single-factor authentication uses only single evidence of
authentication to prove the identification of the user, and it does
not have multiple levels, unlike multifactor authentication.
Entering a user password is one of the examples of single-factor
authentication
RESEARCH PROJECT
Access Control
Select a topic of your choosing in the area of Access Control
and write a research paper as part of a group project. Make this
a paper appropriate for journal publication. That is you must
endeavor to meet all the requirements of such a project. Hence,
your paper should include all or most of the following:
1. Appropriate figures and tables
2. The research method(s)
3. The results
4. The discussion
5. Clear conclusion
6. A compelling introduction
7. An abstract
8. A well concise and descriptive title
9. Acknowledgements
10. References
Deliverables: a) Research proposal approval: we have done this,
please find attachment(Multi-factor authentication vs single-
factor authentication
b) Research paper presentation
c) Final paper submission

More Related Content

Similar to The necessary privacy of a client ID and secret passcode is becomi.docx

CMIT 321 Executive Proposal ProjectThe purpose of this project i.docx
CMIT 321 Executive Proposal ProjectThe purpose of this project i.docxCMIT 321 Executive Proposal ProjectThe purpose of this project i.docx
CMIT 321 Executive Proposal ProjectThe purpose of this project i.docx
monicafrancis71118
 
CMIT 321 Executive Proposal ProjectThe purpose of this project i.docx
CMIT 321 Executive Proposal ProjectThe purpose of this project i.docxCMIT 321 Executive Proposal ProjectThe purpose of this project i.docx
CMIT 321 Executive Proposal ProjectThe purpose of this project i.docx
clarebernice
 
The comparison of written and mediaCompare and contrast simila.docx
The comparison of written and mediaCompare and contrast simila.docxThe comparison of written and mediaCompare and contrast simila.docx
The comparison of written and mediaCompare and contrast simila.docx
mehek4
 
A REPORT ON THE ANALYSIS ON WEB AUTHENTICATION BASED ON SINGLE BLOCK HASH FUN...
A REPORT ON THE ANALYSIS ON WEB AUTHENTICATION BASED ON SINGLE BLOCK HASH FUN...A REPORT ON THE ANALYSIS ON WEB AUTHENTICATION BASED ON SINGLE BLOCK HASH FUN...
A REPORT ON THE ANALYSIS ON WEB AUTHENTICATION BASED ON SINGLE BLOCK HASH FUN...
SIR SUCCESS PRINCE DUAH DUAH
 
Authentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_webAuthentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_webSafeNet
 
Security Testing In The Secured World
Security Testing In The Secured WorldSecurity Testing In The Secured World
Security Testing In The Secured World
Jennifer Mary
 
MITS5004 Assignment 3 2 Copyright © 2015-2018 VIT, All Rig.docx
MITS5004 Assignment 3 2 Copyright © 2015-2018 VIT, All Rig.docxMITS5004 Assignment 3 2 Copyright © 2015-2018 VIT, All Rig.docx
MITS5004 Assignment 3 2 Copyright © 2015-2018 VIT, All Rig.docx
helzerpatrina
 
MITS5004 Assignment 3 2 Copyright © 2015-2018 VIT, All Rig.docx
MITS5004 Assignment 3 2 Copyright © 2015-2018 VIT, All Rig.docxMITS5004 Assignment 3 2 Copyright © 2015-2018 VIT, All Rig.docx
MITS5004 Assignment 3 2 Copyright © 2015-2018 VIT, All Rig.docx
roushhsiu
 
76 s201923
76 s20192376 s201923
76 s201923
IJRAT
 
Application Security Review 5 Dec 09 Final
Application Security Review 5 Dec 09 FinalApplication Security Review 5 Dec 09 Final
Application Security Review 5 Dec 09 Final
Manoj Agarwal
 
Comparative analysis of authentication and authorization security in distribu...
Comparative analysis of authentication and authorization security in distribu...Comparative analysis of authentication and authorization security in distribu...
Comparative analysis of authentication and authorization security in distribu...
eSAT Journals
 
Report writing
Report writingReport writing
Report writing
arjun thakur
 
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationAddressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Peter Choi
 
[EMC] Source Code Protection
[EMC] Source Code Protection[EMC] Source Code Protection
[EMC] Source Code ProtectionPerforce
 
Improving our Approach Towards Capturing Value in Requirements
Improving our Approach Towards Capturing Value in RequirementsImproving our Approach Towards Capturing Value in Requirements
Improving our Approach Towards Capturing Value in Requirements
Osama M. Khaled
 
CMIT 321 Executive Proposal ProjectThe purpose of this project is .docx
CMIT 321 Executive Proposal ProjectThe purpose of this project is .docxCMIT 321 Executive Proposal ProjectThe purpose of this project is .docx
CMIT 321 Executive Proposal ProjectThe purpose of this project is .docx
fathwaitewalter
 
CMIT 321 Executive Proposal ProjectThe purpose of this project is .docx
CMIT 321 Executive Proposal ProjectThe purpose of this project is .docxCMIT 321 Executive Proposal ProjectThe purpose of this project is .docx
CMIT 321 Executive Proposal ProjectThe purpose of this project is .docx
drennanmicah
 
ByteCode pentest report example
ByteCode pentest report exampleByteCode pentest report example
ByteCode pentest report example
Ihor Uzhvenko
 
CMIT 321 EXECUTIVE PROPOSAL PROJECT
CMIT 321 EXECUTIVE PROPOSAL PROJECTCMIT 321 EXECUTIVE PROPOSAL PROJECT
CMIT 321 EXECUTIVE PROPOSAL PROJECT
HamesKellor
 

Similar to The necessary privacy of a client ID and secret passcode is becomi.docx (20)

CMIT 321 Executive Proposal ProjectThe purpose of this project i.docx
CMIT 321 Executive Proposal ProjectThe purpose of this project i.docxCMIT 321 Executive Proposal ProjectThe purpose of this project i.docx
CMIT 321 Executive Proposal ProjectThe purpose of this project i.docx
 
CMIT 321 Executive Proposal ProjectThe purpose of this project i.docx
CMIT 321 Executive Proposal ProjectThe purpose of this project i.docxCMIT 321 Executive Proposal ProjectThe purpose of this project i.docx
CMIT 321 Executive Proposal ProjectThe purpose of this project i.docx
 
The comparison of written and mediaCompare and contrast simila.docx
The comparison of written and mediaCompare and contrast simila.docxThe comparison of written and mediaCompare and contrast simila.docx
The comparison of written and mediaCompare and contrast simila.docx
 
A REPORT ON THE ANALYSIS ON WEB AUTHENTICATION BASED ON SINGLE BLOCK HASH FUN...
A REPORT ON THE ANALYSIS ON WEB AUTHENTICATION BASED ON SINGLE BLOCK HASH FUN...A REPORT ON THE ANALYSIS ON WEB AUTHENTICATION BASED ON SINGLE BLOCK HASH FUN...
A REPORT ON THE ANALYSIS ON WEB AUTHENTICATION BASED ON SINGLE BLOCK HASH FUN...
 
Authentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_webAuthentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_web
 
Security Testing In The Secured World
Security Testing In The Secured WorldSecurity Testing In The Secured World
Security Testing In The Secured World
 
MITS5004 Assignment 3 2 Copyright © 2015-2018 VIT, All Rig.docx
MITS5004 Assignment 3 2 Copyright © 2015-2018 VIT, All Rig.docxMITS5004 Assignment 3 2 Copyright © 2015-2018 VIT, All Rig.docx
MITS5004 Assignment 3 2 Copyright © 2015-2018 VIT, All Rig.docx
 
MITS5004 Assignment 3 2 Copyright © 2015-2018 VIT, All Rig.docx
MITS5004 Assignment 3 2 Copyright © 2015-2018 VIT, All Rig.docxMITS5004 Assignment 3 2 Copyright © 2015-2018 VIT, All Rig.docx
MITS5004 Assignment 3 2 Copyright © 2015-2018 VIT, All Rig.docx
 
76 s201923
76 s20192376 s201923
76 s201923
 
Application Security Review 5 Dec 09 Final
Application Security Review 5 Dec 09 FinalApplication Security Review 5 Dec 09 Final
Application Security Review 5 Dec 09 Final
 
Comparative analysis of authentication and authorization security in distribu...
Comparative analysis of authentication and authorization security in distribu...Comparative analysis of authentication and authorization security in distribu...
Comparative analysis of authentication and authorization security in distribu...
 
CCSK.pptx
CCSK.pptxCCSK.pptx
CCSK.pptx
 
Report writing
Report writingReport writing
Report writing
 
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationAddressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
 
[EMC] Source Code Protection
[EMC] Source Code Protection[EMC] Source Code Protection
[EMC] Source Code Protection
 
Improving our Approach Towards Capturing Value in Requirements
Improving our Approach Towards Capturing Value in RequirementsImproving our Approach Towards Capturing Value in Requirements
Improving our Approach Towards Capturing Value in Requirements
 
CMIT 321 Executive Proposal ProjectThe purpose of this project is .docx
CMIT 321 Executive Proposal ProjectThe purpose of this project is .docxCMIT 321 Executive Proposal ProjectThe purpose of this project is .docx
CMIT 321 Executive Proposal ProjectThe purpose of this project is .docx
 
CMIT 321 Executive Proposal ProjectThe purpose of this project is .docx
CMIT 321 Executive Proposal ProjectThe purpose of this project is .docxCMIT 321 Executive Proposal ProjectThe purpose of this project is .docx
CMIT 321 Executive Proposal ProjectThe purpose of this project is .docx
 
ByteCode pentest report example
ByteCode pentest report exampleByteCode pentest report example
ByteCode pentest report example
 
CMIT 321 EXECUTIVE PROPOSAL PROJECT
CMIT 321 EXECUTIVE PROPOSAL PROJECTCMIT 321 EXECUTIVE PROPOSAL PROJECT
CMIT 321 EXECUTIVE PROPOSAL PROJECT
 

More from dennisa15

The objective of this assignment is to encourage the students to.docx
The objective of this assignment is to encourage the students to.docxThe objective of this assignment is to encourage the students to.docx
The objective of this assignment is to encourage the students to.docx
dennisa15
 
The objective of the work is to do a program in C++, to consult the .docx
The objective of the work is to do a program in C++, to consult the .docxThe objective of the work is to do a program in C++, to consult the .docx
The objective of the work is to do a program in C++, to consult the .docx
dennisa15
 
The objective of the term paper requirement is to give you an opport.docx
The objective of the term paper requirement is to give you an opport.docxThe objective of the term paper requirement is to give you an opport.docx
The objective of the term paper requirement is to give you an opport.docx
dennisa15
 
The objective of the term project assignment is to prepare a Bid Pro.docx
The objective of the term project assignment is to prepare a Bid Pro.docxThe objective of the term project assignment is to prepare a Bid Pro.docx
The objective of the term project assignment is to prepare a Bid Pro.docx
dennisa15
 
The objective of the term paper requirement is to give you an oppo.docx
The objective of the term paper requirement is to give you an oppo.docxThe objective of the term paper requirement is to give you an oppo.docx
The objective of the term paper requirement is to give you an oppo.docx
dennisa15
 
The objective of the introductory speech is for you to share a meani.docx
The objective of the introductory speech is for you to share a meani.docxThe objective of the introductory speech is for you to share a meani.docx
The objective of the introductory speech is for you to share a meani.docx
dennisa15
 
The objective of the introductory speech is for you to share a m.docx
The objective of the introductory speech is for you to share a m.docxThe objective of the introductory speech is for you to share a m.docx
The objective of the introductory speech is for you to share a m.docx
dennisa15
 
The objective of assignment is to provide a power point presentation.docx
The objective of assignment is to provide a power point presentation.docxThe objective of assignment is to provide a power point presentation.docx
The objective of assignment is to provide a power point presentation.docx
dennisa15
 
The objective of assignment is to provide a power point presenta.docx
The objective of assignment is to provide a power point presenta.docxThe objective of assignment is to provide a power point presenta.docx
The objective of assignment is to provide a power point presenta.docx
dennisa15
 
The nursing metaparadigm offers insights concerning the nature in wh.docx
The nursing metaparadigm offers insights concerning the nature in wh.docxThe nursing metaparadigm offers insights concerning the nature in wh.docx
The nursing metaparadigm offers insights concerning the nature in wh.docx
dennisa15
 
The nursing metaparadigm concept I intend to focus on is person .docx
The nursing metaparadigm concept I intend to focus on is person .docxThe nursing metaparadigm concept I intend to focus on is person .docx
The nursing metaparadigm concept I intend to focus on is person .docx
dennisa15
 
The nurse proceeds to palpate the lymph nodes. Which lymph nodes.docx
The nurse proceeds to palpate the lymph nodes. Which lymph nodes.docxThe nurse proceeds to palpate the lymph nodes. Which lymph nodes.docx
The nurse proceeds to palpate the lymph nodes. Which lymph nodes.docx
dennisa15
 
The number of American telecommuters is expected to increase by 29 m.docx
The number of American telecommuters is expected to increase by 29 m.docxThe number of American telecommuters is expected to increase by 29 m.docx
The number of American telecommuters is expected to increase by 29 m.docx
dennisa15
 
The number of Americans ages 65 and older is projected to nearly d.docx
The number of Americans ages 65 and older is projected to nearly d.docxThe number of Americans ages 65 and older is projected to nearly d.docx
The number of Americans ages 65 and older is projected to nearly d.docx
dennisa15
 
The number of American telecommuters is expected to increase by .docx
The number of American telecommuters is expected to increase by .docxThe number of American telecommuters is expected to increase by .docx
The number of American telecommuters is expected to increase by .docx
dennisa15
 
The noun phrase introducers of npChapter 4the noun phr.docx
The noun phrase  introducers of npChapter 4the noun phr.docxThe noun phrase  introducers of npChapter 4the noun phr.docx
The noun phrase introducers of npChapter 4the noun phr.docx
dennisa15
 
The notion of solipsism suggests that ones own mind is the only ent.docx
The notion of solipsism suggests that ones own mind is the only ent.docxThe notion of solipsism suggests that ones own mind is the only ent.docx
The notion of solipsism suggests that ones own mind is the only ent.docx
dennisa15
 
The Norton Sampler the two essays The Sancturay of School and .docx
The Norton Sampler the two essays  The Sancturay of School and .docxThe Norton Sampler the two essays  The Sancturay of School and .docx
The Norton Sampler the two essays The Sancturay of School and .docx
dennisa15
 
The non-profit organization (Inspirational Leaders) that you work fo.docx
The non-profit organization (Inspirational Leaders) that you work fo.docxThe non-profit organization (Inspirational Leaders) that you work fo.docx
The non-profit organization (Inspirational Leaders) that you work fo.docx
dennisa15
 
The Nominal Group Technique (NGT) is a common method of group decisi.docx
The Nominal Group Technique (NGT) is a common method of group decisi.docxThe Nominal Group Technique (NGT) is a common method of group decisi.docx
The Nominal Group Technique (NGT) is a common method of group decisi.docx
dennisa15
 

More from dennisa15 (20)

The objective of this assignment is to encourage the students to.docx
The objective of this assignment is to encourage the students to.docxThe objective of this assignment is to encourage the students to.docx
The objective of this assignment is to encourage the students to.docx
 
The objective of the work is to do a program in C++, to consult the .docx
The objective of the work is to do a program in C++, to consult the .docxThe objective of the work is to do a program in C++, to consult the .docx
The objective of the work is to do a program in C++, to consult the .docx
 
The objective of the term paper requirement is to give you an opport.docx
The objective of the term paper requirement is to give you an opport.docxThe objective of the term paper requirement is to give you an opport.docx
The objective of the term paper requirement is to give you an opport.docx
 
The objective of the term project assignment is to prepare a Bid Pro.docx
The objective of the term project assignment is to prepare a Bid Pro.docxThe objective of the term project assignment is to prepare a Bid Pro.docx
The objective of the term project assignment is to prepare a Bid Pro.docx
 
The objective of the term paper requirement is to give you an oppo.docx
The objective of the term paper requirement is to give you an oppo.docxThe objective of the term paper requirement is to give you an oppo.docx
The objective of the term paper requirement is to give you an oppo.docx
 
The objective of the introductory speech is for you to share a meani.docx
The objective of the introductory speech is for you to share a meani.docxThe objective of the introductory speech is for you to share a meani.docx
The objective of the introductory speech is for you to share a meani.docx
 
The objective of the introductory speech is for you to share a m.docx
The objective of the introductory speech is for you to share a m.docxThe objective of the introductory speech is for you to share a m.docx
The objective of the introductory speech is for you to share a m.docx
 
The objective of assignment is to provide a power point presentation.docx
The objective of assignment is to provide a power point presentation.docxThe objective of assignment is to provide a power point presentation.docx
The objective of assignment is to provide a power point presentation.docx
 
The objective of assignment is to provide a power point presenta.docx
The objective of assignment is to provide a power point presenta.docxThe objective of assignment is to provide a power point presenta.docx
The objective of assignment is to provide a power point presenta.docx
 
The nursing metaparadigm offers insights concerning the nature in wh.docx
The nursing metaparadigm offers insights concerning the nature in wh.docxThe nursing metaparadigm offers insights concerning the nature in wh.docx
The nursing metaparadigm offers insights concerning the nature in wh.docx
 
The nursing metaparadigm concept I intend to focus on is person .docx
The nursing metaparadigm concept I intend to focus on is person .docxThe nursing metaparadigm concept I intend to focus on is person .docx
The nursing metaparadigm concept I intend to focus on is person .docx
 
The nurse proceeds to palpate the lymph nodes. Which lymph nodes.docx
The nurse proceeds to palpate the lymph nodes. Which lymph nodes.docxThe nurse proceeds to palpate the lymph nodes. Which lymph nodes.docx
The nurse proceeds to palpate the lymph nodes. Which lymph nodes.docx
 
The number of American telecommuters is expected to increase by 29 m.docx
The number of American telecommuters is expected to increase by 29 m.docxThe number of American telecommuters is expected to increase by 29 m.docx
The number of American telecommuters is expected to increase by 29 m.docx
 
The number of Americans ages 65 and older is projected to nearly d.docx
The number of Americans ages 65 and older is projected to nearly d.docxThe number of Americans ages 65 and older is projected to nearly d.docx
The number of Americans ages 65 and older is projected to nearly d.docx
 
The number of American telecommuters is expected to increase by .docx
The number of American telecommuters is expected to increase by .docxThe number of American telecommuters is expected to increase by .docx
The number of American telecommuters is expected to increase by .docx
 
The noun phrase introducers of npChapter 4the noun phr.docx
The noun phrase  introducers of npChapter 4the noun phr.docxThe noun phrase  introducers of npChapter 4the noun phr.docx
The noun phrase introducers of npChapter 4the noun phr.docx
 
The notion of solipsism suggests that ones own mind is the only ent.docx
The notion of solipsism suggests that ones own mind is the only ent.docxThe notion of solipsism suggests that ones own mind is the only ent.docx
The notion of solipsism suggests that ones own mind is the only ent.docx
 
The Norton Sampler the two essays The Sancturay of School and .docx
The Norton Sampler the two essays  The Sancturay of School and .docxThe Norton Sampler the two essays  The Sancturay of School and .docx
The Norton Sampler the two essays The Sancturay of School and .docx
 
The non-profit organization (Inspirational Leaders) that you work fo.docx
The non-profit organization (Inspirational Leaders) that you work fo.docxThe non-profit organization (Inspirational Leaders) that you work fo.docx
The non-profit organization (Inspirational Leaders) that you work fo.docx
 
The Nominal Group Technique (NGT) is a common method of group decisi.docx
The Nominal Group Technique (NGT) is a common method of group decisi.docxThe Nominal Group Technique (NGT) is a common method of group decisi.docx
The Nominal Group Technique (NGT) is a common method of group decisi.docx
 

Recently uploaded

Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
kitab khulasah nurul yaqin jilid 1 - 2.pptx
kitab khulasah nurul yaqin jilid 1 - 2.pptxkitab khulasah nurul yaqin jilid 1 - 2.pptx
kitab khulasah nurul yaqin jilid 1 - 2.pptx
datarid22
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
MERN Stack Developer Roadmap By ScholarHat PDF
MERN Stack Developer Roadmap By ScholarHat PDFMERN Stack Developer Roadmap By ScholarHat PDF
MERN Stack Developer Roadmap By ScholarHat PDF
scholarhattraining
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
AG2 Design
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Reflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdfReflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdf
amberjdewit93
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 

Recently uploaded (20)

Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
kitab khulasah nurul yaqin jilid 1 - 2.pptx
kitab khulasah nurul yaqin jilid 1 - 2.pptxkitab khulasah nurul yaqin jilid 1 - 2.pptx
kitab khulasah nurul yaqin jilid 1 - 2.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
MERN Stack Developer Roadmap By ScholarHat PDF
MERN Stack Developer Roadmap By ScholarHat PDFMERN Stack Developer Roadmap By ScholarHat PDF
MERN Stack Developer Roadmap By ScholarHat PDF
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Reflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdfReflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 

The necessary privacy of a client ID and secret passcode is becomi.docx

  • 1. The necessary privacy of a client ID and secret passcode is becoming difficult nowadays to secure our most sensitive data. Phishing, malware, and trojan virus are some of the most occurred security threats, to overcome these, we will need to keep our authentication layers to be more secured. This research paper supports Multi-factor authentication due to its more secured layer features and functionality compared to that of Single factor authentication. Security teams have the option to select between two authentications factors: · Single-factor authentication · Multi-factor authentication Choosing what's best for your company requires careful thought of the advantages and disadvantages of each approach. The two are not fundamentally unrelated; you can have both or one can be used. Multifactor authentication uses a strategy of two or more levels of authentication evidence to prove the identification of a user trying to access a system that includes password, OTP (One- time-password), data of birth, etc. Single-factor authentication uses only single evidence of authentication to prove the identification of the user, and it does not have multiple levels, unlike multifactor authentication. Entering a user password is one of the examples of single-factor authentication RESEARCH PROJECT Access Control Select a topic of your choosing in the area of Access Control and write a research paper as part of a group project. Make this a paper appropriate for journal publication. That is you must endeavor to meet all the requirements of such a project. Hence, your paper should include all or most of the following:
  • 2. 1. Appropriate figures and tables 2. The research method(s) 3. The results 4. The discussion 5. Clear conclusion 6. A compelling introduction 7. An abstract 8. A well concise and descriptive title 9. Acknowledgements 10. References Deliverables: a) Research proposal approval: we have done this, please find attachment(Multi-factor authentication vs single- factor authentication b) Research paper presentation c) Final paper submission