Fandom

The IT Law Wiki

Authentication technologies

32,198pages on
this wiki
Add New Page
Talk0 Share

Ad blocker interference detected!


Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers

Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.

Definition Edit

Authentication technologies

associate a user with a particular identity. People are authenticated by three basic means: by something they know, something they have, or something they are. People and systems regularly use these means to identify people in everyday life.[1]

Overview Edit

"For example, members of a community routinely recognize one another by how they look or how their voices sound — by something they are. Automated teller machines recognize customers because they present a bank card — something they have &mdash and they enter a personal identification number (PIN) — something they know. Using a key to enter a locked building is another example of using something you have. More secure systems may combine two of more of these approaches.

While the use of passwords is an example of authentication based on something users know, there are several technologies based on something users have. Security tokens can be used to authenticate a user. User information can be coded onto a token using magnetic media (for example, bank cards) or optical media (for example, compact disk-like media). Several smart token technologies containing an integrated circuit chip that can store and process data are also available. Biometric technologies automate the identification of people using one or more of their distinct physical or behavioral characteristics — authentication based on something that users are. The use of security tokens or biometrics requires the installation of the appropriate readers at network and computer access points.

[2]

References Edit

  1. Technology Assessment: Cybersecurity for Critical Infrastructure Protection, at 148.
  2. Id.

Also on Fandom

Random Wiki