CHAPTER 6Authenticating People
▶ About This Chapter
In this chapter, we look at techniques to accurately associate individuals with user identities inside a computer. The discussion will focus on passwords with an introduction to other methods. The chapter examines the following topics:
■ The three authentication factors: what you know, you have, and you are
■ Passwords, password bias, and search space calculations
■ Cryptographic building blocks: random choice, one-way hash
■ Authentication devices: personal tokens and biometrics
■ Basic issues in authentication policy
Get Elementary Information Security, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.