1. In the context of information processing, computer security and trusted systems, explain what is meant by the following terms and why we want to use them:
• Authentication;
• Two factor authentication;
• Multifactor authentication; and
• Authorization.
2. Search the web using Google or some other search engine for existing commercially available two factor authentication software packages and choose one.
3. Next search for authorization software packages and choose one.
4. Describe both packages.
5. For each package analyze the strengths, weaknesses, economics (i.e. cost and licensing), and the Information Technology environment(s) in which each can operate.
You may use diagrams and examples in order to facilitate your response if you believe it would help.