Articles on Trending Technologies

Technical articles with clear explanations and examples

What is the need of Authentication in Information Security?

Ginni
Ginni
Updated on 11-Mar-2022 1K+ Views

Authentication is the procedure of checking if a user or entity or device is who claims to be. In another terms, it is a set of verification and Identification. Authentication falls into three elements which are as follows −The knowledge factors − Something the user understand such as a password, pass phrase, or personal identification number (PIN), challenge response, design.The ownership factors − Something the user has wrist band, ID card, security token, cell phone with included hardware token, software token, or cell phone holding a software token.The inherence factors − Something the user is or does such as fingerprint, ...

Read More

What are the Authentication methods in Information Security?

Ginni
Ginni
Updated on 11-Mar-2022 674 Views

There are various method of Authentication which are as follows −Biometrics − Biometrics is a term that defines the measuring unique individual characteristics including the retina, the iris, fingerprints or even the face. Today, the concept is usually used by most people to define a method for protecting computers and saved data requiring a user to endure a scan of the body part used for identification.While several systems need a fingerprint or retinal scan as a user password, systems that are serious about security frequently need a password and a biometric scan before open the computer or device.There are some ...

Read More

What is the difference between Two-factor Authentication and Multi-factor Authentication in Information Security?

Ginni
Ginni
Updated on 11-Mar-2022 590 Views

Two-factor AuthenticationTwo-factor authentication (2FA) a type of multi-factor authentication (MFA). It is an approach of creating access to an online account or computer system that needed the user to support two different types of information.It is a security procedure that cross-verifies users with two multiple forms of identification, most generally knowledge of an email address and authentication of control of a mobile phone.2FA is frequently employed in online banking websites, social media platforms and ecommerce sites as an approach to harden access controls to the more responsive location of a web application including admin panels or areas that store credit ...

Read More

What are the types of multi-factor authentication?

Ginni
Ginni
Updated on 11-Mar-2022 399 Views

Multi-factor authentication (MFA) is a security procedure that needed users to respond to requests to test their identities before they can access networks or other online software. MFA can use knowledge, control of physical elements, or geographic or network areas to prove integrity.Multi-factor authentication is a layered method to protecting information and applications where a system needed a user to present a set of two or more credentials to test a user’s identity for login.MFA operates by requiring more verification data is known as “authentication factors. It can ensure that digital users are who they say they are. These elements ...

Read More

C++ code to find minimum operations to make numbers c and d

Arnab Chakraborty
Arnab Chakraborty
Updated on 11-Mar-2022 432 Views

Suppose we have two numbers c and d. Amal has two numbers a and b initially both are zero. Amal wants to perform some operation on them. Before performing each operation, some positive integer k is picked, which is then used to perform one of the following operations −add number k to both a and b, oradd number k to a and subtract k from b, oradd number k to b and subtract k from a.We have to find the minimum number of operations needed to make a and b equal to c and d respectively. If not possible, return ...

Read More

C++ code to check phone number can be formed from numeric string

Arnab Chakraborty
Arnab Chakraborty
Updated on 11-Mar-2022 1K+ Views

Suppose we have a string S with n digits. A number with exactly 11 digits is a telephone number if it starts with '8'. In one operation, we can remove one digit from S. We have to check whether we can make the string a valid phone number or not.So, if the input is like S = "5818005553985", then the output will be True, because we can make the string "8005553985" with 11 characters and first digit is 8.StepsTo solve this, we will follow these steps −m := size of S insert '8' at the end of S if if location of 8

Read More

C++ code to process query operation on binary array

Arnab Chakraborty
Arnab Chakraborty
Updated on 11-Mar-2022 408 Views

Suppose we have an array A with n elements and another list of queries Q with q queries. each Query[i] contains a pair (x, k). When we process a query, for x: decrease the value of A[x] by 1. For k, print kth largest element. Initially all elements in A is either 0 or 1.So, if the input is like A = [1, 1, 0, 1, 0]; Q = [[2, 3], [1, 2], [2, 3], [2, 1], [2, 5]], then the output will be [1, 1, 1, 0]StepsTo solve this, we will follow these steps −n := size of A ...

Read More

C++ code to check pack size can be determined from given range

Arnab Chakraborty
Arnab Chakraborty
Updated on 11-Mar-2022 249 Views

Suppose we have two numbers l and r. There is a shop and we want to sell some food container with 'a' number of foods with a discount, and some customer wants to buy x foods. The customer following a greedy strategy −He buys floor of (x/a) packs with discountThen wants to buy remaining (x mod a) foods one by one.But the customer is greedy, so if he wants to buy (x mod a) foods one by one and it happens that (x mod a) ≥ a/2, so he decides to buy the whole pack of a foods. A customer ...

Read More

C++ code to count copy operations without exceeding k

Arnab Chakraborty
Arnab Chakraborty
Updated on 11-Mar-2022 236 Views

Suppose we have an array A with n elements and another number k. There are n piles of candies. The ith pile has A[i] number of candies. We can perform the operation on two indices i and j (i != j), then add another A[i] number of candies to A[i] (A[i] will not be reduced). We can perform this operation any number of times, but unfortunately if some pile contains strictly more than k candies we cannot perform the operation anymore. We have to find the maximum number of times we can perform this operation.So, if the input is like ...

Read More

C++ code to check array can be formed from Equal Not-Equal sequence or not

Arnab Chakraborty
Arnab Chakraborty
Updated on 11-Mar-2022 230 Views

Suppose we have a string S of length . Consider there are n numbers and they are arranged in a circle. We do not know the values of these numbers but if S[i] = 'E' it indicates ith and (i+1)th numbers are same, but if that is 'N' then they are different. From S we have to check whether we can recreate the sequence or not.So, if the input is like S = "ENNEENE", then the output will be True, because we can assign values like [15, 15, 4, 20, 20, 20, 15].StepsTo solve this, we will follow these steps ...

Read More
Showing 45231–45240 of 61,297 articles
Advertisements