PHENOMENOLOGICAL ANALYSIS OF EXISTING AUTHENTICATION METHODS
The article discusses authentication methods for users of local area networks and automated workplaces in order to determine the most relevant ways to counter internal intruders using other users' credentials to log in. The threat to information security is determined, implemented by an internal information security violator in various ways, for subsequent use of the obtained access to the accounts of other users as a springboard for the implementation of computer attacks. A comparative analysis of authentication methods for users of local area networks and automated workplaces was carried out by the method of expert assessment. The comparative analysis carried out in the work suggests that countering the above-mentioned threat to information security is possible by introducing functional elements responsible for performing the authentication procedure into the operating system's access control and management system using biometric authentication methods based on the dynamics of the user's work.
Khramov M.A., Kornev L.V., Shablya V.O. Phenomenological analysis of existing authentication methods // Research result. Information technologies. – Т. 9, №1, 2024. – P. 29-36. DOI: 10.18413/2518-1092-2024-9-1-0-4
While nobody left any comments to this publication.
You can be first.
1. Methodological document. Methodology for assessing information security threats [Electronic resource]: approved by FSTEC of Russia 05.02.2021 // URL: https://fstec.ru/dokumenty/vse-dokumenty/spetsialnye-normativnye-dokumenty/metodicheskij-dokument-ot-5-fevralya-2021-g // (accessed: 03/03/2024).
2. Komekov E.A. Authentication systems // Bulletin of Science and Education. 2022. No. 1. pp. 1-4.
3. Sidorkina I.G. Classification of human authentication methods // Bulletin of the V.N. Tatishchev Volga State University. 2009. No. 1. pp. 1-6.
4. Koryakova V.A. Smartphone user authentication based on data obtained from the accelerometer // Caspian Journal: Management and high technologies. 2023. No. 61(1). pp. 59-72.
5. Kurakov V.I. Vulnerability analysis of biometric authentication methods // The international scientific journal "Bulletin of Science". 2022. No. 5(50). pp. 87-98.
6. Vishnyakov V.A. Models and means of user authentication in corporate management systems and cloud computing // Reports of the Belarusian State University of Informatics and Radioelectronics. 2016. No. 3(97).
pp. 111-114.
7. Posmetukhova K.N. Review and brief analysis of modern authentication methods // Science and reality. 2023. No. 2(14). pp. 58-62.
8. Osin A.V. Review of user identification methods based on digital fingerprints // Proceedings of educational institutions of communications. 2023. No. 5. pp. 91-111.
9. GOST R 58833-2020 Information protection. Identification and authentication. General provisions.