Explaining the basics of authentication systems to prepare for security risks. Also introducing operations that consider the magnitude of threats and the burden of management.
This document explains "authentication" and "authentication systems," which are fundamental elements of cybersecurity. Chapter 1 introduces the role and positioning of authentication and the importance of preparing for threats such as unauthorized access. From Chapter 2, it discusses the basic concepts of authentication, the mechanisms of authentication using PINs and passwords, and the characteristics of authentication systems considering countermeasures against threats and operational aspects. 【Contents】 1. Considering Authentication 2. Basics of Authentication 3. Various Threats to Password Authentication 4. Various Authentication Methods 1 5. Various Authentication Methods 2 6. Complementary Authentication Methods 7. Single Sign-On and Federation 8. Operation and Management of Authentication Systems *The document can be viewed immediately by downloading the catalog.
Inquire About This Product
basic information
**Table of Contents (Excerpt)** ■ Positioning of "Authentication" in Computers and Services ■ Threats to Authentication ■ Elements for Authentication ■ Authentication via PINs and Passwords ■ Attacks on Passwords Not Just from the Front Door ■ Authentication via One-Time Passwords ■ Cryptographic Authentication and Key Protection ■ Biometric Authentication ■ Multi-Factor Authentication ■ Authentication via Secret Questions ■ Confirmation and Approval via Email, Phone, SMS, etc. ■ Recovery of Authentication Elements ■ Risk-Based Authentication and Behavioral Pattern Authentication ■ Single Sign-On and Its Mechanism ■ ID and Authentication Federation and the Cloud ■ Logs of Authentication Systems ■ Authentication Logs and Response to Security Incidents
Applications/Examples of results
-
catalog(1)
Download All Catalogs









