Chapter 4

Verifying User and Host Identity

Keith Lewis     Keller Graduate School of Management, Naperville, IL, United States

Abstract

When you buy a ticket to a sports event nowadays, the ticket desk uses bar code readers that reply with a positive “beep” sound or display noting that the ticket is authentic. Sometimes you can print them online, buy them at the ticket counter, or have them mailed to your home. The advantage of this system is that a person trained in security validation is interfacing with part of the security checking technology. When it comes to using your computer devices only to gain system or data access, it is entirely technological without the advantages of human interaction except for your responses to a security process ...

Get Computer and Information Security Handbook, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.