This was last updated in December 2014
Contributor(s): Ivy Wigmore
Posted by: Margaret Rouse
Whatis.com
Inherence factor
The inherence factor, in a security context, is a category of user
authentication credentials consisting of elements that are integral to the
individual in question, in the form of biometric data.
In information
technology, biometrics refers to technologies that measure and analyze human
body characteristics, such as DNA, fingerprints, eye retinas and irises, voice
patterns, facial patterns and hand measurements, for authentication purposes.
One of the
three main categories of authentication factors, inherence is sometimes characterized as something
the user is. The other two categories are knowledge (something the user knows) and possession (something the user has).
Biometric authentication examples:
For single factor authentication (SFA), a user might, for example, submit themselves to a retinal scan for access to a secure facility. Biometric data from the scan would then be compared with a confirmed stored sample.
For single factor authentication (SFA), a user might, for example, submit themselves to a retinal scan for access to a secure facility. Biometric data from the scan would then be compared with a confirmed stored sample.
For two-factor
authentication (2FA), a user might enter a username and password
to unlock a multi-user computer and then
provide a finger scan to open protected files.
Three-factor
authentication (3FA) involves elements of each main category of
authentication factors. A user might enter a personal identification number
(PIN) to unlock a smartphone, input a one-time password (OTP) generated by a soft token application and then provide an iris
scan for added security.
Multifactor
authentication (MFA) significantly increases the security of
logins, with each additional factor making it less likely that an unauthorized
individual could masquerade as a legitimate user.
===========================================================
In addition to this blog, I maintain a radio show on BlogtalkRadio and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and Yahoo. I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and PSG of Mercer County, NJ.
Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
If you have not already done so, please view the trailer for my book below.
In addition to this blog, I maintain a radio show on BlogtalkRadio and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and Yahoo. I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and PSG of Mercer County, NJ.
I am the president of Tabula Rosa Systems,
a “best of breed” reseller of products for communications, email,
network management software, security products and professional
services. Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.
Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
If you have not already done so, please view the trailer for my book below.
===============================================
No comments:
Post a Comment