Conclusion

 <  Day Day Up  >  

Whether authentication is being done for verification of a friend's identity or for computer access, the same factors of authentication can be used. Something you know, something you have, and/or something you are can be used to provide increasing levels of assurance of your identity. If we combine these factors, we can achieve even better results. The drive to interconnect the corporate desktop PC on a LAN and the subsequent connection to the Internet have provided access to vast computing power over the Internet. This computing power can be used to compromise passwords in a fraction of the time it used to take a single computer. Consequently, passwords are now a larger security risk than ever before. At the same time, users have more passwords to use and remember. Strong authentication can provide better authentication methods than passwords. The strengthening of an electronic signature and the convenience provided by SSO are made possible through the use of biometric authentication. The move to stronger authentication is being driven by password proliferation and network risk mitigation. Employing biometric technology is an intelligent part of any strong authentication strategy.

 <  Day Day Up  >  


Biometrics for Network Security
Biometrics for Network Security (Prentice Hall Series in Computer Networking and Distributed)
ISBN: 0131015494
EAN: 2147483647
Year: 2003
Pages: 123
Authors: Paul Reid

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net