358,035 views
24 votes
24 votes
George has been appointed as the new CISO and aske

to implement a new user based authentication solution
This solution includes granting logical access based a
physical location and proximity. Which of the following
the BEST autentication solution for George to implement

User Lakeishia
by
2.9k points

1 Answer

26 votes
26 votes

Answer:

Step-by-step explanation:

There are several options for implementing user-based authentication based on physical location and proximity. One option could be to use a combination of two-factor authentication (2FA) and location-based authentication.

Two-factor authentication involves requiring users to provide two different forms of authentication in order to access a system. This could include something the user knows (e.g. a password), something the user has (e.g. a security token), and/or something the user is (e.g. a fingerprint). By requiring two forms of authentication, it increases the security of the system and makes it harder for unauthorized individuals to gain access.

Location-based authentication involves using the user's physical location as an additional factor in the authentication process. This could be done using GPS coordinates or by detecting the user's proximity to a specific location or device (e.g. using Bluetooth). By requiring users to be in a specific location in order to access the system, it adds an additional layer of security.

Combining two-factor authentication with location-based authentication can provide a strong solution for user-based authentication. However, it is important to carefully consider the specific requirements and constraints of the system and ensure that the chosen solution is appropriate and effective.

User Dori Naji
by
3.0k points