by Admin | Jul 2, 2021 | Analysis
1 ContextYou are a system architect in a large cyber security consultancy. You have been asked to propose a solution to meet the requirements of a new client. The client is a UK University. The client uses an ID card-based authentication system to enable access to...