(2006)Modeling an intelligent authentication system to protect financial information(Discussion).pdfVIP

  • 1
  • 0
  • 约7.55千字
  • 约 3页
  • 2018-01-31 发布于浙江
  • 举报

(2006)Modeling an intelligent authentication system to protect financial information(Discussion).pdf

International Journal of Accounting Information Systems 7 (2006) 110 – 112 Discussion Modeling an intelligent authentication system to protect financial information R.P. Sundarraj Department of Management Sciences, 200 University Avenue West, Waterloo, Canada N2L 3G1 Received 15 November 2005; received in revised form 1 March 2006; accepted 8 March 2006 Security is a serious issue that is negatively impacting the usage of the Internet today. As pointed out by the authors, a significant portion of companies experiences intrusion of some sort or the other. This problem is further exacerbated when people use mobile devices and when they conduct Internet transactions that involve financial information. This context raises the need for authenticating users beyond their first point of entry, and thereby motivates this paper. The paper first describes a framework for the provision of continuous authentication, and then outlines swarm optimization as a potential technological solution for this authentication. 1. Strengths 1.1. Security framework After a review of the state of current authentication systems and showing the static nature of such systems, the authors provide the groundwork for continuous authentication. They rightly make clear that even in its most rigorous form, static authentication only validates an entitys identity at the time of access-request. What is, however, desirable today is to ensure that the person who started to use the system is the one who is actually continuing to use it at every point in time. Another notable point presented by the authors is the fact that a significant portion of the intrusions in an organization take place from within. In other words,

您可能关注的文档

文档评论(0)

1亿VIP精品文档

相关文档