SANS Whitepaper – Biometrics and User Authentication 3.5 3.5.2 Identification and Authentication
This SANS whitepaper looks at the use of biometrics technology to determine how secure it might be in authenticating users.
This SANS whitepaper looks at the use of biometrics technology to determine how secure it might be in authenticating users.
This SANS whitepaper discusses implementing an additional security layer for wired networks.
This SANS whitepaper discusses the theory behind user-based two-factor (or multifactor) authentication systems, also known as “2FA”.
This SANS whitepaper focuses on enterprise solutions for two-factor authentication.
This SANS whitepaper discusses vendor-supplied passwords that are embedded in software/hardware.
More on Two-Factor Authentication and it's ineffectivenss defense against identity theft.
This example policy from the State of Alabama provides a starting point for system maintenance.
This Security Requirements Guide (SRG) is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the NIST 800-53 and related documents.
This whitepaper is directed at IT, Security, and Compliance workers who are responsible for recommending or evaluating security products; or running and managing two-factor authentication infrastructure.
This is an example of an identification and authentication policy for Texas A&M