Why an updated certificate is needed

Assignment Help Computer Engineering
Reference no: EM133689615

Problem

The Enterprise Architecture Repository is an online, web-based platform designed to store and organize Enterprise Architecture artifacts produced by EA software tools. You work as a developer for CMS and want to protect the security of the organization. You have developed a level of trust with the development team, and they see that your skills and personality are a match to their organization. Now they have requested your opinions on this application development project.

Your research has shown that many organizations have formulated methods to implement greater security principles by incorporating two-factor authentication.

Develop a proposal that will incorporate two-factor authentication for this development project. You have already had a plan to create an internal certificate and use this as the two-factor check for any devices that have already authenticated once.

Be sure to include the following into your documentation:

1) Recommendation of why an updated certificate is needed and your rational for your recommendation.

2) Description of two-factor authentication and how it is becoming more widely used within the industry.

3) Explanation of the plan for two-factor authentication in the first login. Include screen shots within this section as proof of how this will work. Then include a brief explanation of how an internal certificate will be used thereafter for that device.

Reference no: EM133689615

Questions Cloud

Social impact of the disease and increase its transmission : How did the early view of HIV and AIDS as the gay plague shape the social impact of the disease and increase its transmission?
Lifestyle changes should begin prior to pregnancy : The author's in our textbook state that lifestyle changes should begin prior to pregnancy
What is meant by enterprise agility : Research what is meant by enterprise agility and compare and contrast the waterfall and agile methodology. Include when one method is preferred over the other.
Write a report on your chosen influencer for organisation : Write a report on your chosen influencer for the organisation assigned to you, the criteria you used in selecting this influencer, and a back-up influencer
Why an updated certificate is needed : Recommendation of why an updated certificate is need and your rational for your recommendation. How internal certificate will be use thereafter for that device?
Economic issues in the health care industry : As a health care manager, you must be able to analyze financial and economic issues in the health care industry.
How researchers could respond to the potential ethical issue : Compare and contrast various research methodologies and Evaluation of training program for managers of employees with intellectual disabilities
Will countries engage in race-to-the-bottom policy making : Will countries engage in race-to-the-bottom policy making and forfeit our privacy and security to give their domestic companies a competitive advantage?
Describe the steps described in article i : Describe the steps described in Article I that were taken, or are being taken, to alleviate the effects of the breach after the fact or to resolve the issue.

Reviews

Write a Review

Computer Engineering Questions & Answers

  How these learning contributes to future development goals

Discuss a selection of work-based learning and how these learning contributes to future development goals. How someone with Apprenticeships can progress on

  How does given impact data management within organizations

How does this impact data management within organizations? How does servant leadership assist with transferring knowledge in an organization?

  What are the two principle type of clustering

What are the two principle type of clustering? Take the top-ranked candidate words as words that have potential syntagmatic relations with w1?

  Questionthe code below is used for answering -int

questionthe code below is used for answering -int unknownalgorithmint a int k int nint ij minitmpfori0 ilt k imini

  Write a program using cygwin that calculates tension

Write a program using Cygwin that calculates tension. Declare variables and input your own number.

  How situational awareness is a driver for detection controls

Create a new thread. As indicated above, describe how situational awareness is a driver for detection and response controls. Select AT LEAST 3 other students'.

  Define the importance of security policies

Using the guidelines provided Below, create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely.

  Discuss the potential benefits that come with using platform

Discuss the potential benefits that come with using these platforms, as well as the drawbacks that users should be mindful of.

  How unix permissions can be regarded as access control lists

Explain how UNIX permissions can be regarded as access control lists. Contrast access control lists and capability-based access control.

  Discuss efficiency in systems operation

Sustainability in IT is a common topic that has its root in efficiency in systems operation

  Evaluate the impact of modern hardware and software systems

Advanced Systems Analysis & Design - evaluate the impact of modern hardware and software systems, technologies, platforms and services on system design

  Define exception and throw when the fraction is instantiated

Write a class Fraction, define a exception and throw when the fraction is instantiated with zero in the denominator.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd