Human Factors Used in Authentication
You learned about using passwords, tokens, and biometrics to authenticate a user. Authentication factors are discussed in terms of something you know, something you have, and something you are. This article explains these three factors.
Chapter 6: Information Systems Security
Upon successful completion of this chapter, you will be able to: identify the information security triad; identify and understand the high-level concepts surrounding information security tools; and secure yourself digitally.
- identify the information security triad;
- identify and understand the high-level concepts surrounding information security tools; and
- secure yourself digitally.
Source: David T. Bourgeois, https://bus206.pressbooks.com/chapter/chapter-6-information-systems-security/
This work is licensed under a Creative Commons Attribution 4.0 License.