What Is Really Being Achieved with User Authentication?
The term identity verification is frequently used to describe a desire to secure access to systems or services, whether that be to access a computer, mobile phone, cash machine (automated teller machine (ATM)), Amazon account, or government services, purchase movies through iTunes or travel internationally. Whilst arguably a need exists in all of these particular examples, a question that arises is whether the current mechanisms in place to provide identity verification are actually achieving the level of security required.
KeywordsMobile Phone Credit Card Personal Identification Number Identity Verification Authentication Mechanism
- ISO: ISO/IEC 27001:2005 Information technology – Security techniques – Information security management systems – Requirements. International Standards Organisation. Available at: http://www.iso.org/iso/catalogue_detail?csnumber=42103 (2005). Accessed 10 Apr 2011