August 2019
Intermediate to advanced
342 pages
9h 35m
English
From what we have said so far, it should be clear that the use of authentication procedures based on security tokens, such as passwords, SMS, OTPs, and others, should at least be integrated with automated anomaly detection procedures.
Among the anomalies related to the management of user accounts is the following:
Obviously, the list of events to be monitored ...
Read now
Unlock full access