Changes

Security+ - Authentication and Identity Verification

75 bytes added, 18:50, 20 July 2009
no edit summary
<hr>
<google>BUY_SECURITYPLUS</google>
In the preceding chapter of [[Security+ Essentials]] we looked in detail at the various levels of access control used to govern access to system resources once a user has logged into a system. While access control provides a high level of control over what a user can do once they are on the system, it does nothing to prevent unauthorized users from logging onto the system in the first place. As mentioned previously, any comprehensive IT security strategy must consist of multiple layers of security. One of the cornerstones of a good strategy involves the use of authentication and identity verification. In this chapter the various methods of authentication will be covered.
Other possible biometric identification possibilities include retinal scans and voice recognition.
<google>BUY_SECURITYPLUS_BOTTOM</google>
<hr>