2. Knock, Knock. Who’s There?

Chapter Spotlight

• Identification and authentication

• Identification failures

• Strong authentication: based on something you know, are, or have

• Physiological properties and authentication

• The relationship between privacy and strong authentication: anonymous access and pseudonyms

• The relationship between usability and strong authentication

Your neighbor recognizes you, sees you frequently, and knows you are someone who should be going into your home. Your ...

Get Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.