Passwords - Basic Concepts: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
''What are Passwords?'' <br> |
''What are Passwords?'' <br><br> |
||
In a typical system, human users must authenticate themselves to |
In a typical system, human users must authenticate themselves to |
||
a client through in general three possible ways: |
a client through in general three possible ways: |
||
Line 10: | Line 10: | ||
system. But for reasons of cost most systems take the second option. |
system. But for reasons of cost most systems take the second option. |
||
By that managing passwords is a real-world problem. |
By that managing passwords is a real-world problem. |
||
---- |
|||
[[Passwords - Introduction|Back (Introduction)]] | [[Passwords - Table of Contents|Table of Contents]] | [[Passwords - Psychology Issues|Next (Psychology Issues)]] |
Latest revision as of 19:09, 8 November 2004
What are Passwords?
In a typical system, human users must authenticate themselves to
a client through in general three possible ways:
1.Physical control of the device (“something you have”)
2.Presenting information, which is hopefully only in your own mind (“something you know”)
3.Authentication through unique biological attributes (“something you are”)
Combinations are possible and used for example in the ec/credit-card system. But for reasons of cost most systems take the second option. By that managing passwords is a real-world problem.
Back (Introduction) | Table of Contents | Next (Psychology Issues)