December 2019
Intermediate to advanced
500 pages
16h 2m
English
Learning Objectives
After studying this chapter, you should be able to:
Discuss the three general means of authenticating a user’s identity
Explain the mechanism by which hashed passwords are used for user authentication
Present an overview of password-based user authentication
Present an overview of hardware token-based user authentication
Present an overview of biometric user authentication
Summarize some of the key security issues for user authentication
Understand the different types of access control
Present an overview of identity and access management concepts
This chapter and Chapter 6, “Malicious Software and Intruders,” provide an overview of technical measures that have been developed to meet the objectives ...