SANS Institute – Global Information Assurance Certification Paper 3.5 3.5.4 Identification and Authentication
This document shows how to improve the security of a network through the use of authentication applications.
This document shows how to improve the security of a network through the use of authentication applications.
This SANS whitepaper generalizes several authentication methods and authentication protocols.
This SANS whitepaper looks at the use of biometrics technology to determine how secure it might be in authenticating users.
This SANS whitepaper discusses implementing an additional security layer for wired networks.
This SANS whitepaper discusses the theory behind user-based two-factor (or multifactor) authentication systems, also known as “2FA”.
This SANS whitepaper focuses on enterprise solutions for two-factor authentication.
More on Two-Factor Authentication and it's ineffectivenss defense against identity theft.
This example policy from the State of Alabama provides a starting point for system maintenance.
This whitepaper is directed at IT, Security, and Compliance workers who are responsible for recommending or evaluating security products; or running and managing two-factor authentication infrastructure.
This is an example of an identification and authentication policy for Texas A&M