IDENTITY
The first part of a login process is providing some form of identification, such as a username or email address.
AUTHENTICATION FACTORS
Proves that the user is who they claim to be. Authentication credentials should be kept secret. This helps prevent unauthorized users from gaining access to confidential information. There are five authentication factors.
1. Something you know: Password, PIN, passphrase, security question answer, CAPTCHA, a PIN that was mailed to you.
2. Something you have: CAC (Common Access Card), PIV (Personal Identity Verification), Smart Card, Digital Certificate (CAC, PIV, & Smart Card are all digital certificates), PIN or code sent to your cell phone, key fob or token (pic to the right)
3. Something you are: Fingerprint, iris scan, retina scan, facial scan, voice pattern, palm geometry.
4. Somewhere you are: IP address, MAC address, GPS location computer name.
5. Something you do: Signature analysis, signature dynamics, have the user sign their name, keyboard timing, keystroke dynamics, gait (the way you walk), finger swipe pattern.
No comments:
Post a Comment