Description
Discussion
The network restrictions surrounding the web authentication service is one layer of defense. As was noted, this component is too valuable to trust to a single defense. Furthermore, authentication requests are tendered by the least-trusted component in the architecture. That component, HTTP termination, resides on the least-trusted network. What additional steps can be taken?
Explanation & Answer
Hello find the attachment
Running head: IT SECURITY
1
IT Security
Name
Institution
IT SECURITY
2
IT Security
One of the possible solutions or ways of dealing with is by having a communication
authenticated from HTTP before having to process any authentication process. There are a lot of
issues in the security community and instead of learning from the previous problems o
challenges experience the new technology user still uses fail to practice the defense in depth in
the right way. As the computer, as well as other digital devices, has increasingly become a
targeted audience of attacks. Therefore there a lot of things and improvements that are required
to make in the computerization sector. Authentication is one of the processes of security
processes on the internet or the technology world.
...