Network Security Illustrated buy the book at Amazon now!


search site
Table of Contents

Book
Introduction

Managing
Security

Outsourcing
Options

Reserving
Rights

Determining
Identity

Preserving
Privacy

Connecting
Networks

Hardening
Networks

Storing
Information

Hiding
Information

Accessing
Information

Ensuring
Availability

Detecting
Intrusions

Page Tools
print this pagePrint this Page
Determining
Identity
Chapter List
Passwords
Digital Certificates
Portable Identifiers
Biometrics
Single Sign-On (web bonus)
More Information
Resources (links)
Discussions
FAQs
Errata
Sample Pages
Buy The Book
at amazon.com

Summary

It’s not enough to have a secure connection between two machines. You also need to be sure that the person or computer you’re connected to is who it claims to be. This part discusses the pros and cons of the many available identification systems as well as ideal technology combinations.

Key Points

  • Philosophy tells us that a person is more than just the uniqueness of his or her body.
  • Technology views a person as a combination of attributes, knowledge, actions, and possessions.
  • A digital identity allows the defining characteristics of a person to be rapidly accessed whenever and wherever necessary.
  • When properly combined, multiple types of identification technology can improve security.

Connections

Modern identification systems use a combination of technologies, ranging from simple passwords to complex biometric systems (such as fingerprint or retina scanners). This part’s chapters explore the most commonly used identification technologies and concepts as follows:

  • Passwords examines the words, phrases, or patterns that grant access to a system.

  • Digital Certificates covers the electronic documents that verifiably prove the bearer’s identity.

  • Portable Identifiers discusses the physical items that can associate a digital identity with the bearer.

  • Biometrics concerns the technologies that measure a person’s vital statistics in order to determine identity.

  • Single Sign-On (web bonus) describes standards and technologies for providing a central repository of authentication information. (Online Bonus Content)

More Information

The above information is an excerpt from "Network Security Illustrated," published by McGraw-Hill and available from amazon.com, as well as your local bookstore. The book goes into much greater depth on this topic. To learn more about the book and what it covers, click here.

Below, you'll find links to online resources that supplement this portion of the book.


Resources

(websites, books, etc.)

Discussions

FAQs

Errata

Sample Pages