Human Factors Used in Authentication

You learned about using passwords, tokens, and biometrics to authenticate a user. Authentication factors are discussed in terms of something you know, something you have, and something you are. This article explains these three factors.

Chapter 6: Information Systems Security

Learning Objectives


Upon successful completion of this chapter, you will be able to: identify the information security triad; identify and understand the high-level concepts surrounding information security tools; and secure yourself digitally.

  • identify the information security triad;
  • identify and understand the high-level concepts surrounding information security tools; and
  • secure yourself digitally.

Source: David T. Bourgeois, https://bus206.pressbooks.com/chapter/chapter-6-information-systems-security/
Creative Commons License This work is licensed under a Creative Commons Attribution 4.0 License.