Understanding and selecting authentication methods
If you are serious about computer/network security, then you must have a solid understanding of authentication methods. Debra Littlejohn Shinder takes a moment to lay out the role authentication plays in a security plan. Computer/network security hinges on two very simple goals:Keeping unauthorized persons from gaining access to resourcesEnsuring that authorized persons can access the resources they needThere are a number of components involved in accomplishing these objectives. One way is to assign access permissions to resources that specify which users can or cannot access those resources and under what circumstances. (For example, you may want a specific user or group of users to have access when logged on from a computer that is physically on-site but not from a remote dial-up connection.) Access permissions, however, work only if you are able to verify the identity of the user who is attempting to access the resources. How does authentication work?
• information security