Chapter 4

Verifying User and Host Identity

Keith Lewis     Keller Graduate School of Management, Naperville, IL, United States

Abstract

When you buy a ticket to a sports event nowadays, the ticket desk uses bar code readers that reply with a positive “beep” sound or display noting that the ticket is authentic. Sometimes you can print them online, buy them at the ticket counter, or have them mailed to your home. The advantage of this system is that a person trained in security validation is interfacing with part of the security checking technology. When it comes to using your computer devices only to gain system or data access, it is entirely technological without the advantages of human interaction except for your responses to a security process ...

Get Computer and Information Security Handbook, 3rd Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.