Access Control 05


Access Control 05 : Physical Security: (1) Access Control System Operation: For example, Alice has access rights to the server room but Bob does not. Alice either gives Bob her credential or Bob takes it; he now has access to the server room. To prevent this, two-factor authentication can be used. In a two factor transaction, the presented credential and a second factor are needed for access to be granted; another factor can be a PIN, a second credential, operator intervention, or a biometric input. There are three types (factors) of authenticating information: (a) something the user knows, e. g. a password, pass-phrase or PIN; (b) something the user has, such as smart card; (c) something the user is, such as fingerprint, verified by biometric measurement. Passwords are a common means of verifying a user's identity before access is given to information systems. In addition, a fourth factor of authentication is now recognized: someone you know, where another person who knows you can provide a human element of authentication in situations where systems have been set up to allow for such scenarios. For example, a user may have their password, but have forgotten their smart card. In such a scenario, if the user is known to designated cohorts, the cohorts may provide their smart card and password in combination with the extant factor of the user in question and thus provide two factors for the user with missing credential, and three factors overall to allow access
No records Found
afaatim.com copyright © April 2016 Dr.K.R.Kamaal. All rights reserved