Instructions

Discussion: Smart Card versus Authenticator App:

The Personal Identity Verification (PIV) card is used in non-military government agencies for authentication and identification to gain access to systems, networks, and online resources. These cards, in combination with a personal identification number, meet two-factor requirements. PIV credentials also are designed to help reduce counterfeiting and are tamper-resistant.
An authenticator app, such as Google Authenticator, is another method to achieve two-factor authentication. It is a free app available for installation on mobile devices.
The U.S. federal government authorizes the use of PIVs as well as authenticator apps, depending on the circumstances.


Answer the following question(s):
1.In what type of situation would an authenticator app provide adequate two-factor authentication for federal government use? Provide rationale or a citation for your answer.


2.In what type of situation would a PIV be required for federal government use? Provide rationale or a citation for your answer.


Fully address the questions in this discussion; provide valid rationale or a citation for your choices; and respond to at least two other students’ views.


Write at least 400 words in length.

———————————————————————————————————-

Task 2-

Discussion: Resistance Behavior:

Users who see security as an obstacle or a nuisance are less likely to abide by security policies. Referred to as “resistance behavior,” a Virginia Tech study found that even if people understand that a security breach can have severe consequences on an organization, that knowledge does not always make users accept and conform to security policy rules. Individuals may feel their competence challenged, which triggers a negative attitude toward security in general. Users may also view some security controls, such as scheduled password changes, as unnecessary interruptions. Security controls, such as a fingerprint scanner, that don’t work consistently may make users feel overwhelmed and lead to mistrust of security controls or even overriding them.

Answer the following question(s):


1.If you were a professional in charge of security for an organization, what would you say to a user who believes they have the right to decide whether to participate in security measures?
2.In the same scenario, what kind of incentive do you think would encourage the user to participate?

Order with us today for a quality custom paper on the above topic or any other topic!

What Awaits you:

• High Quality custom-written papers

• Automatic plagiarism check

• On-time delivery guarantee

• Masters and PhD-level writers

• 100% Privacy and Confidentiality