User Tools

Site Tools


systems:security

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revisionBoth sides next revision
systems:security [2013/11/18 23:43] – created superwizardsystems:security [2013/11/18 23:46] superwizard
Line 14: Line 14:
     But instead of having to read the password off the token and retype it, employees can simply plug     But instead of having to read the password off the token and retype it, employees can simply plug
     the token into a USB port or touch it on a mobile device using near-field communication     the token into a USB port or touch it on a mobile device using near-field communication
 +    
 +    risk-based authentication. This technology sifts through masses of user data from various groups 
 +    at a company to establish "normal" behavior, then assigns risk scores to each user.
 +    
 +    Test subjects in the research wore a headset that measured their brain-wave signals as they imagined 
 +    performing a particular task, and the researchers were able to distinguish between different people 
 +    with 99% accuracy.
 +    
 +    London-based PixelPin Ltd., meanwhile, wants to replace passwords with pictures. Choose a picture of 
 +    your spouse, for example, and log in by clicking on four parts of her face in a sequence you've memorized
systems/security.txt · Last modified: 2019/03/30 05:03 by superwizard