Identification, Authentication, and Access Control

Identification, Authentication, and Access Control

Lech J. Janczewski, Andrew M. Colarik
ISBN13: 9781591405832|ISBN10: 1591405831|EISBN13: 9781591405504
DOI: 10.4018/978-1-59140-583-2.ch010
Cite Chapter Cite Chapter

MLA

Lech Janczewski and Andrew Colarik. "Identification, Authentication, and Access Control." Managerial Guide for Handling Cyber-Terrorism and Information Warfare, IGI Global, 2005, pp.129-162. https://doi.org/10.4018/978-1-59140-583-2.ch010

APA

L. Janczewski & A. Colarik (2005). Identification, Authentication, and Access Control. IGI Global. https://doi.org/10.4018/978-1-59140-583-2.ch010

Chicago

Lech Janczewski and Andrew Colarik. "Identification, Authentication, and Access Control." In Managerial Guide for Handling Cyber-Terrorism and Information Warfare. Hershey, PA: IGI Global, 2005. https://doi.org/10.4018/978-1-59140-583-2.ch010

Export Reference

Mendeley
Favorite

Abstract

It is a known fact that terrorists are developing a keen set of technology skills to further their agendas. As previously stated, they use IT for their operational purposes as well as for launching attacks. In the IT domain, identification/authentication of a user is the first step in gaining access to system resources. Identity theft attacks are the simplest way to accomplish this objective, as was discussed in the preceding chapter. In these times of increased security awareness, IT managers must examine very carefully their identification and authentication subsystems to prevent the disabling or bypassing of the system by an unauthorized party. In this section, we will discuss identification, authentication methods, access control, and how to strengthen these methods for added resistance against possible attacks.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.