This study focuses on the less obvious vulnerabilities of information systems and the philosophy and technology behind two-factor identification, authentication, and access control systems. How two-factor systems can be technically overlaid for implementation in existing environments is addressed. The theoretical issues associated with using ignition keys stored in tokens versus transmitting them in both clear text and encrypted form are discussed. Guidelines for securing computer resources are presented. Two-factor identification is discussed along with token-based ID authentication. Open networks and secure passwords, are also examined.
展开▼