1)The three common factors that are used for authentication are: Something you know, some you have, and something you are. ID cards and card readers use access control cards that individuals would carry with them. As noted by Fennelly (2016), there a various card readers types would be used to match the card types and various environments. Here are the common card types used:
- Magnetic stripe
- Wiegand wire
- Passive proximity
- Active proximity
- Implantable proximity
- Smart cards
- Barium ferrite
- Rare-earth magnet
Select and discuss 1 common card type. Additionally, mention where you selected card type is commonly used.
A quality post is more than stating, “I agree with you.” Maybe you should state why you agree with your classmate’s post. Additionally, post some examples or find a related topic on the internet or University’s library and comment on it in the discussion post.
Reference: Fennelly, L.J. (2017). Effective Physical Security, 5th Edition. Cambridge, MA: Elsevier.
2)In this scenario, hackers launch cyber attacks that affect several parts of the nation’s financial infrastructure over the course of several weeks. Specifically, sensitive credit card processing facilities are hacked and numbers are released to the Internet, causing 120 million cards to be cancelled; automated teller machines (ATMs) fail nearly simultaneously across the nation; major companies report payroll checks are not being received by workers; and several large pension and mutual fund companies have computer malfunctions so severe that they are unable to operate for more than a week. Identify the countermeasures that need to be implemented to prevent these cyber attacks from occurring in the future.
Start a discussion thread and discuss what type(s) of countermeasures need to be implemented to prevent the cyber attack described above from occurring in the future. Be specific in recommending countermeasures for this scenario.
You must do this following:
1) Create a new thread. As indicated above, discuss what type(s) of countermeasures need to be implemented to prevent the cyber attack described above from occurring in the future. Be specific in recommending countermeasures for this scenario.
2) Select AT LEAST 3 other students’ threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread.
ALL original posts and comments must be substantive. (I’m looking for about a paragraph – not just “I agree.”)