Sc Business Data Communications and Networking, Thirteenth Edition Student Choice Print on Demand
Expert Solution & Answer
Book Icon
Chapter 11, Problem 40Q

Explanation of Solution

Major ways to authenticate users:

  • Authentication is the process which is used by the computer’s operating system to verify whether the person who is going to use the system is authorized or not...

Explanation of Solution

Pros and cons of password:

Pros:

  • Password give best mid-level security to users.
  • It is simple to use.
  • It does not need extra configuration.

Cons:

  • Password won’t stop the professional intruder.
  • It does not provide a strong identity check.
  • Security is completely based on strength and confidentiality of the password.

Pros and cons of smart card:

Pros:

  • Smart card have a lot of flexibility.
  • Information on smart cart cannot be erased or removed accidentally by any electronical or magnetic device...

Blurred answer
Knowledge Booster
Background pattern image
Recommended textbooks for you
Text book image
Computer Networking: A Top-Down Approach (7th Edi...
Computer Engineering
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:PEARSON
Text book image
Computer Organization and Design MIPS Edition, Fi...
Computer Engineering
ISBN:9780124077263
Author:David A. Patterson, John L. Hennessy
Publisher:Elsevier Science
Text book image
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:9781337569330
Author:Jill West, Tamara Dean, Jean Andrews
Publisher:Cengage Learning
Text book image
Concepts of Database Management
Computer Engineering
ISBN:9781337093422
Author:Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:Cengage Learning
Text book image
Prelude to Programming
Computer Engineering
ISBN:9780133750423
Author:VENIT, Stewart
Publisher:Pearson Education
Text book image
Sc Business Data Communications and Networking, T...
Computer Engineering
ISBN:9781119368830
Author:FITZGERALD
Publisher:WILEY