Advertisement

What Is Really Being Achieved with User Authentication?

  • Nathan Clarke
Chapter

Abstract

The term identity verification is frequently used to describe a desire to secure access to systems or services, whether that be to access a computer, mobile phone, cash machine (automated teller machine (ATM)), Amazon account, or government services, purchase movies through iTunes or travel internationally. Whilst arguably a need exists in all of these particular examples, a question that arises is whether the current mechanisms in place to provide identity verification are actually achieving the level of security required.

Keywords

Mobile Phone Credit Card Personal Identification Number Identity Verification Authentication Mechanism 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Reference

  1. ISO: ISO/IEC 27001:2005 Information technology – Security techniques – Information security management systems – Requirements. International Standards Organisation. Available at: http://www.iso.org/iso/catalogue_detail?csnumber=42103 (2005). Accessed 10 Apr 2011

Copyright information

© Springer-Verlag London Limited 2011

Authors and Affiliations

  1. 1.Centre for Security, Communications & Network Research (CSCAN)Plymouth UniversityPlymouthUK

Personalised recommendations