Enterprise data processing networks: authentication and identifcation procedures
Автор: Vasilenko K.A., Zolkin A.L., Abramov N.V., Kurganov D.O.
Журнал: Инфокоммуникационные технологии @ikt-psuti
Рубрика: Электромагнитная совместимость и безопасность оборудования
Статья в выпуске: 1 т.18, 2020 года.
Бесплатный доступ
This article is dedicated to the problem of personal data and information protection from intruders, as well as to methods of authentication and identification in the enterprise data processing networks. Different methods of authentication and identification in data processing networks are given in the article. The authors have conducted the comparative analysis of these methods, have highlighted the features and weaknesses of these methods in different fields of application. In addition to the above the authors have conducted the risks analysis and analyzed the possible losses in case of confidentiality compromise. Every year, the amount of violations in data confidentiality, availability and integrity is growing as well as the amount of caused losses. These facts make cyber security specialists conduct more careful and deep analyses of all risks of unauthorized access to the information and then to introduce modern authentication means, use new coding methods and increase the frequency of generation of the new system access passwords. Today, there are many authentication means and methods, but the specifics of their application depend on the location of the information storage and its value. Meanwhile, the authentication methods are not flawless methods of protection, they are also vulnerable and success of their hack depends on the skills of the intruders.
Enterprise data processing networks, passwords, tokens, authentication, identification, information safety, algorithm
Короткий адрес: https://sciup.org/140256246
IDR: 140256246 | DOI: 10.18469/ikt.2020.18.1.10