This resource is no longer available
A Security Survey of Strong Authentication Technologies
Proof of authentication is easily manipulated – passwords are guessable, and a user’s history is easily discovered.
How can you enhance these security methods without inconveniencing users? In this resource, explore the pros and cons of the most common types of authentication methods and the classes of attacks used to impersonate authorized users. Click through to learn which type of solution – oftentimes multiple are required to get the job done – is best fit based on the threats you expect to be exposed to.