Chapter 2

Identification and Authentication

In this chapter, we cover the security principles of identification and authentication. We discuss identification as a process by which we assert the identity of a particular party, whether this is true or not. We talk about the use of authentication as the means of validating whether the claim of identity is true. We also cover multifactor authentication and the use of biometrics and hardware tokens to enhance surety in the authentication process.

Keywords

Authentication; biometrics; hardware tokens; identification; multifactor authentication; mutual authentication; passwords; security tokens

Get The Basics of Information Security, 2nd Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.