16+
DOI: 10.18413/2518-1092-2024-9-1-0-4

PHENOMENOLOGICAL ANALYSIS OF EXISTING AUTHENTICATION METHODS

The article discusses authentication methods for users of local area networks and automated workplaces in order to determine the most relevant ways to counter internal intruders using other users' credentials to log in. The threat to information security is determined, implemented by an internal information security violator in various ways, for subsequent use of the obtained access to the accounts of other users as a springboard for the implementation of computer attacks. A comparative analysis of authentication methods for users of local area networks and automated workplaces was carried out by the method of expert assessment. The comparative analysis carried out in the work suggests that countering the above-mentioned threat to information security is possible by introducing functional elements responsible for performing the authentication procedure into the operating system's access control and management system using biometric authentication methods based on the dynamics of the user's work.

Number of views: 277 (view statistics)
Количество скачиваний: 822
Full text (PDF)To articles list
  • User comments
  • Reference lists

While nobody left any comments to this publication.
You can be first.

Leave comment: