首页> 美国政府科技报告 >Communications and Information: Identification and Authentication.
【24h】

Communications and Information: Identification and Authentication.

机译:通信和信息:识别和认证。

获取原文

摘要

This manual provides information system users, system administrators, workgroup managers, and CSSOs with proper identification and authentication (I&A) procedures. 'Identification' is the process where individuals identify themselves to a system as a valid user. 'Authentication' is the procedure where the system verifies the user has a right to access the system User identifications (user-ID) and passwords, because of their cost-efficiency and ease of implementation, are the most common I&A method. Because of their vulnerability to interception or inadvertent disclosure, they are also the weakest of I&A methods. Passwords are only effective when used properly. Inappropriate passwords create some of today's most common information system vulnerabilities.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号