This article is a continuation of the article ‘Securing information through identification, authentication and authorization’. The table below gives the pros and cons of the various authentication methodologies. Continue reading “Authentication methodologies compared”
Securing information through Identification, Authentication and Authorisation
Authentication is a critical component of the access control mechanisms implemented by organizations to secure information. Underlying principle of logical access control is to identify whether a user is in fact the right person whom he claims to be and provide the right type of access to that person. Continue reading “Securing information through Identification, Authentication and Authorisation”
Responding to Authentication challenges in Online Banking
Traditional authentication mechanisms for online banking have been password and/or a one time password from a dedicated token. Variants or a combination of these two authentication types have been deployed by most banks across the globe. Increasingly these traditional customer authentication methods are being challenged and defeated. Continue reading “Responding to Authentication challenges in Online Banking”