Skip to Content
Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices
book

Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices

by William Stallings
December 2019
Intermediate to advanced
500 pages
16h 2m
English
Addison-Wesley Professional
Content preview from Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices

Chapter 5. System Access

Learning Objectives

After studying this chapter, you should be able to:

  • Discuss the three general means of authenticating a user’s identity

  • Explain the mechanism by which hashed passwords are used for user authentication

  • Present an overview of password-based user authentication

  • Present an overview of hardware token-based user authentication

  • Present an overview of biometric user authentication

  • Summarize some of the key security issues for user authentication

  • Understand the different types of access control

  • Present an overview of identity and access management concepts

This chapter and Chapter 6, “Malicious Software and Intruders,” provide an overview of technical measures that have been developed to meet the objectives ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Privacy, Regulations, and Cybersecurity

Privacy, Regulations, and Cybersecurity

Chris Moschovitis

Publisher Resources

ISBN: 9780135278383