Skip to Main Content
Information Security Management Handbook, Volume 7, 6th Edition
book

Information Security Management Handbook, Volume 7, 6th Edition

by Richard O'Hanley, James S. Tiller
August 2013
Intermediate to advanced content levelIntermediate to advanced
434 pages
15h 17m
English
Auerbach Publications
Content preview from Information Security Management Handbook, Volume 7, 6th Edition
234 ◾  Information Security Management Handbook
reader, hold a security device near an RFID/NFC reader, or enter a constantly changing one-time
password displayed on the device.
e disadvantage to this approach is that the user must keep the token with them, which may
be inconvenient, tokens can malfunction or be lost or stolen, additional cost and complexity is
required to acquire and deploy tokens and readers and the tokens, themselves, while generally
secure, have been known to be compromised through a variety of attacks. For these reasons, pos-
session-based methods are often combined with knowledge-based methods to form a second-factor
authentication system, which lessens the risk of compromise by requiring an attacker to defeat
both c ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Information Security Management Handbook, Volume 5, 6th Edition

Information Security Management Handbook, Volume 5, 6th Edition

Micki Krause Nozaki, Harold F. Tipton
Information Security for Managers

Information Security for Managers

Michael Workman, Daniel C. Phelps, John N. Gathegi

Publisher Resources

ISBN: 9781466567498