What is the definition of single-factor authentication?
Single-factor authentication is where the user can obtain access to an account or service using one factor such as a password.
What is the definition of two-factor authentication?
Two-factor authentication is a security method by which users obtain access by providing two separate factors to identify themselves.
What are the limitations of single-factor authentication?
- Recommended using unique password for each app
What are the 3 different types of factors that can be used for authentication?
What is the bank card reader example?
what does it need and how does it work
Customer needs:
- PIN number (knowledge)
- Debit card (possession)
Customer places card in reader and enters PIN number. The passcode displayed on the care reader is entered into a web login page to allow the customer account access.
What are the benefits of two-factor authentication?
- Secure (hackers tend to avoid)
What are the limitations of two-factor authentication?
- Customers dislike the extra time taken to log in
What are the most commonly given password advice?
- Change passwords regularly
How is access rights set up?
It is set up by system administrator to limit network access to relevant files only for a user.
How is encryption used?
It is used to make stored data more secure, by making it unreadable to people who do not have the key to decode it.
What is firewall?
What is intrusion detection systems?
What is antivirus software?
What is spyware?
What is the purpose of the acceptable use policy?
To ensure that members of the centre understand what is appropriate browsing behaviour, and to specify the directives necessary to protect the IT network infrastructure.
What is the acceptable internet usage?
The acceptable internet usage should include information on what members are encouraged to use Wi-Fi for, and that members must comply with current legislation.
What is unacceptable behaviour?
What is the user compliance?
Members need to sign and date that they have understood the acceptable use policy before using the system.