IBM - forget a password; I have to answer a security...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
1. Some common types of malicious software or malware are tracking cookies, adware, keyloggers, browser hijackers, dialers, and viruses. 2. An example of a human authentication factor would be biometrics. An example of a personal authentication factor would be a security question. An example of a technical authentication factor would be a phone. An example of a traditional two-factor authentication method is the use of a bank card and a PIN number to access a bank account from an ATM. A personal experience of a human factor is when I clock into work. A personal experience of a personal factor is when I
Background image of page 1
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: forget a password; I have to answer a security question. A personal experience of a technical factor would be alerts about my bank account being sent to my phone. 3. Drawbacks of the ZTIC device are the cost; you have to carry it with you wherever you go, and the potential to lose it. 4. Malicious attackers might try to get around devices like the ZTIC by stealing the devices. 5. I do not see a future where malware is completely eliminated, or protections are so good that malware is no longer a threat. Hackers and malware will constantly develop new tools to commit identity theft and fraud....
View Full Document

This document was uploaded on 01/19/2012.

Ask a homework question - tutors are online