Assignment-4:
based on what presented in class, and extra research you conduct: 
 Choose an Information System as a use case. You can use your personal computer or smart phone. 
 Describe an identification mechanism, and how you would implement it to the

here. keep the words short. last time he's said it was too word. just make sure you answer all the questions. here comments from the professor the work you did ."comments , no clear or idea . doesn't answer questions " this was the last work you did for me. he also he ask for implementation not definitions . try to keep than less than 5 pages Assignment-4:
based on what presented in class, and extra research you conduct: 
 Choose an Information System as a use case. You can use your personal computer or smart phone. 
 Describe an identification mechanism, and how you would implement it to the system defined above. 
 List all authentication mechanisms, you learned in class, and how you would implement them into the system defined above. 
 Develop criteria for passwords that is mandatory for users of the system. Such that a user needs to provide mixture of alphanumeric and special character passwords. So is to have users use strong passwords. 
 Design a concealment policy for your system. Describe how salt can be implemented. 
 How would you implement security questions? 
 Describe how you can implement tokens to your systems? 
 How federated identity management and single sign-on is can be implemented into your 
systems?