A Comprehensive Guide to Authentication Technologies and Methods
Authentication of individuals over internet or disperse corporate networks presents multiple opportunities for impersonation and other man-in-the-middle attacks which can lead to fraudulent claims of an individual’s digital identity. Understand the key considerations for selecting an authentication method for organizations.
Report Snap Shot
- Digital Identities and Authentication
- Methods of Authentication
- Classes of Attacks on Authentication Mechanisms
- Analyis of Authentication Mechanisms
- Key Considerations for Selecting an Authenication Method