Halting the Hacker: A Practical Guide to Computer Security (2nd Edition)
| I l @ ve RuBoard |
| Authentication is the process of validating the identity of the entity in question. Usually we think of authenticating users, but systems, programs, data, etc., also have a need for authentication. Authentication information is that piece of information which can be used to verify the accuracy of the identity. This information which is used to authenticate the user 's identity must be protected so that it cannot be used to forge an identity. The factors that can be used to authenticate the identity of an entity are those factors that are unique to that specific entity. The factors must be known or derivable to both the entity being authenticated and the process authenticating the entity. The following are three basic factors that are used in authentication. These basic factors are available to all types of entities.
|
| I l @ ve RuBoard |