{"id":1390,"date":"2016-11-04T10:36:42","date_gmt":"2016-11-04T02:36:42","guid":{"rendered":"http:\/\/people.utm.my\/hazinah\/?p=1390"},"modified":"2016-11-16T09:05:51","modified_gmt":"2016-11-16T01:05:51","slug":"assg5-authentication-schemes","status":"publish","type":"post","link":"https:\/\/people.utm.my\/hazinah\/2016\/11\/assg5-authentication-schemes\/","title":{"rendered":"Assg5 : Authentication schemes"},"content":{"rendered":"<p>CODE: SCSR3413 S11617<\/p>\n<p>In this assignment, I have asked you to use your creativity in designing an authentication scheme using games.<\/p>\n<p>Having seen some &#8216;<em>pre-work<\/em>&#8216; shown to me, I have a few suggestions.<\/p>\n<p>Firstly, Get my name right. Please and thank you.<\/p>\n<div><\/div>\n<div>Secondly, have you fulfilled all the characteristics of a good authentication scheme? What are these characteristics? <strong><span style=\"color: #0000ff\">Research MUST be sufficient<\/span><\/strong> to help you gain enough information to structure your authentication game. Look at your references. That should give you a big clue on how much you read and researched. What have you referred? Is it a resource (article or paper or book) that can give you this knowledge you are seeking?<\/div>\n<div><\/div>\n<blockquote>\n<div><strong><span style=\"color: #800080\">Find not you what you seek in the wrong place.<\/span><\/strong><\/div>\n<\/blockquote>\n<div><\/div>\n<div>You have your game. Cool.<\/div>\n<div><\/div>\n<div><span style=\"color: #0000ff\">Look at it from a users point of view<\/span>, answer questions like :<\/div>\n<div>&#8211; do you find it easy?<\/div>\n<div>&#8211; what is lacking?<\/div>\n<div>&#8211; is it boring (as boring was one issue you highlighted)<\/div>\n<div>&#8211; is it time consuming? How do show how much time it needs?<\/div>\n<div>&#8211; how can I know someone else cannot enter the system as me?<\/div>\n<div><\/div>\n<div>\u00a0[su_spacer size=&#8221;40&#8243;]<\/div>\n<div>Look at it from <span style=\"color: #0000ff\">authentication (server &#8211; system &#8211; organization) point of view\u00a0<\/span><\/div>\n<div>&#8211; if Ali and Ahmad plays this game how are they differentiated by the authentication server?<\/div>\n<div>&#8211; how much resources would I need to provide to ensure that all availability and integrity is maintained? i.e. system does not crash, system does not slow down (lag), how much more storage needed, etc<\/div>\n<div>&#8211; how much time from start to login until gain entrance to system (or rejected)? this has impact towards productivity.<\/div>\n<div><\/div>\n<div>\u00a0[su_spacer size=&#8221;20&#8243;]<\/div>\n<p>Ask a lot of questions, find the different answers. Explore! That is how you learn. Here is a <a href=\"https:\/\/people.utm.my\/hazinah\/wp-content\/uploads\/sites\/709\/2016\/11\/9186.pdf\" target=\"_blank\">list of resources<\/a> you may want to check out.<\/p>\n<p>[su_spacer size=&#8221;20&#8243;]<\/p>\n<div><\/div>\n<div><a href=\"https:\/\/people.utm.my\/hazinah\/2016\/11\/04\/assg5-authentication-schemes\/yoda-said\/\" rel=\"attachment wp-att-1394\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-1394\" src=\"https:\/\/people.utm.my\/hazinah\/wp-content\/uploads\/sites\/709\/2016\/11\/Yoda-said-300x300.jpg\" alt=\"Yoda Said..\" width=\"300\" height=\"300\" \/><br \/>\n<\/a><\/div>\n<div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>CODE: SCSR3413 S11617 In this assignment, I have asked you to use your creativity in designing an authentication scheme using games. Having seen some &#8216;pre-work&#8216; shown to me, I have a few suggestions. Firstly, Get my name right. Please and thank you. Secondly, have you fulfilled all the characteristics of a good authentication scheme? What [&hellip;]<\/p>\n","protected":false},"author":619,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[23,1],"tags":[],"class_list":["post-1390","post","type-post","status-publish","format-standard","hentry","category-computer-security","category-other"],"_links":{"self":[{"href":"https:\/\/people.utm.my\/hazinah\/wp-json\/wp\/v2\/posts\/1390","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/people.utm.my\/hazinah\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/people.utm.my\/hazinah\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/people.utm.my\/hazinah\/wp-json\/wp\/v2\/users\/619"}],"replies":[{"embeddable":true,"href":"https:\/\/people.utm.my\/hazinah\/wp-json\/wp\/v2\/comments?post=1390"}],"version-history":[{"count":0,"href":"https:\/\/people.utm.my\/hazinah\/wp-json\/wp\/v2\/posts\/1390\/revisions"}],"wp:attachment":[{"href":"https:\/\/people.utm.my\/hazinah\/wp-json\/wp\/v2\/media?parent=1390"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/people.utm.my\/hazinah\/wp-json\/wp\/v2\/categories?post=1390"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/people.utm.my\/hazinah\/wp-json\/wp\/v2\/tags?post=1390"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}