Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
For this subsection of Part 1, we go more in depth on Authentication and the process of how to prove/validate information, what the three (3) types of authentication processes are and how they differ. We take a more thorough look into Passwords and you'll learn more about Synchronous vs. Asynchronous, Asynchronous Token Devices, how this authentication process works and how they function, what is required for that tokens use and validation as a process. You'll also learn about Biometric Concerns, what a Crossover Error Rate is and how to you determine fault accept/rejection rates should be.