Slide Show: Extreme And Alternative Authentication Methods
Passwords are the weakest link in access control, but there are plenty of other, less-traveled options for authentication
\Another option still making its way through the academic research process is the idea of utilizing images as a sort of authenticating lock. Users click on a number of points known only to them during enrollment and repeat the process at authentication.
Screen shot courtesy of Mininova Labs
Read more about:
2010About the Author(s)
You May Also Like
Why Effective Asset Management is Critical to Enterprise Cybersecurity
May 21, 2024Finding Your Way on the Path to Zero Trust
May 22, 2024Extending Access Management: Securing Access for all Identities, Devices, and Applications
June 4, 2024Assessing Software Supply Chain Risk
June 6, 2024Preventing Attackers From Wandering Through Your Enterprise Infrastructure
June 19, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024