• user authentication

    User authentication is the verification of an active human-to-machine transfer of credentials required for confirmation of a user’s authenticity; the term contrasts with machine authentication, which involves automated processes that do not require user input.

    Margaret Rouse24,705 pointsBadges:
  • Mainframe vulnerabilities: Be proactive rather than reactive

    What mainframe administrators really need is a discussion of mainframe vulnerabilities. Problem areas include user authentication, system dataset access, disgruntled employees, denial of service attacks, and consoles and monitors that open the system to security breaches. Author Robert Crawford...

    SearchDataCenter3,405 pointsBadges:
  • How 2FA security bolsters user authentication

    IT pros can limit their exposure by solidifying user authentication. One popular option is to implement two-factor authentication, or 2FA, security on logins.

    rhsheldon1,610 pointsBadges:
  • possession factor

    The possession factor, in a security context, is a category of user authentication credentials based on items that the user has with them, typically a hardware device such as a security token or a mobile phone used in conjunction with a software token.

    Margaret Rouse24,705 pointsBadges:
  • inherence factor

    The inherence factor, in a security context, is a category of user authentication credentials consisting of elements that are integral to the individual in question, in the form of biometric data.

    Margaret Rouse24,705 pointsBadges:
  • multifactor token

    Multifactor tokens are security tokens that use more than one category of credential to confirm user authentication. The standard categories of authentication credentials are knowledge factors things that the user knows) inherence factors (things that the user is) and possession factors (things...

    Margaret Rouse24,705 pointsBadges:
  • single-factor token

    A single-factor token is a small hardware device that produces one confirming credential for user authentication; the devices may be used in conjunction with other types of credentials for multifactor authentication.

    Margaret Rouse24,705 pointsBadges:
  • Is user authentication necessary to include in DR plans?

    Independent disaster recovery expert Paul Kirvan discusses user authentication in disaster recovery plans in this Expert Answer.

    PKirvan1,595 pointsBadges:
  • How can I authenticate a customer calling over the phone?

    I work at an international bank and would like to authenticate users requesting wire transfers over the phone.

    ITKE440,635 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.