Page 137 - CISSO_Prep_ Guide
P. 137

Time-based Synchronous Tokens

            Time-based tokens generate a new random value every few
            moments. The user is required to provide the current value on
            the token to the authentication server. If the input value is
            incorrect, then access will be denied.



            RFID
            The use of RFID is increasing as more organizations realize the
            benefits of using small embedded chips for identification and
            authentication. It is simple to track movements of materials,
            employees, vehicles, and stock using small chips that respond to
            a query from an RFID reader. These chips are buried
            (embedded) into shipping containers, product labels, animals,
            and ID cards. The use of RFID can make tracking and inventory
            management easier and can be used to identify genuine versus
            fake products.


            Asynchronous Tokens

            Asynchronous tokens operate on a challenge-response scheme.
            When a user attempts to log in, the authentication server will
            send a challenge. The challenge is a random value, and the user
            must then input the challenge into the token and respond to the
            authentication server. In some cases, the challenge value sent by
            the AS is called a nonce - which stands for 'number used once.'


            Characteristic - Biometrics

            Biometrics is undoubtedly the most controversial form of
            authentication. Biometrics can be intrusive and may disclose
   132   133   134   135   136   137   138   139   140   141   142