Beginning of Section Previous Page
Mastering Intranet and Internet Technology
Next Page Next Section
Bar - Dark Marble

Authentication Methods

There are many ways for a user to prove that theya re who they say they are. Some are more reliable than others. Some are more expensive or intrusive than others...

Method Comments
Username and Password Works with honest people. Not considered adequate for any but the lowest security environments.
Token Keycards, Number Generators and the like. Proves that the user possesses and knows how to use the device.
Biometrics The measurement of some physical attribute of the user ensures that it is the user who is logging in. Finger and Palm Prints, Voice Prints, Face Prints, Foot Prints, etc..
Sometimes these methods will be used together as an extra check.
These methods are becoming economically viable.

Remember: All these methods fail if the user logs in and then leaves the terminal unattended. Physical security must not be overlooked.

Bar - Blue Marble
Beginning of Section Previous Page Home Page Section Beginning Table of Contents Send Email Next Page Next Section
NBS Internet Marketing Web Author: Geoff May Last Update: 06/11/2001
© Copyright 1997 - 2001 by Network Business Services Pty Ltd.
All Rights Reserved.