Techniques or technologies used to authenticate users
Study: 2004 Information Security Breaches Survey Date: April 2004 What techniques do systems use to authenticate users? User ID:
Password:
Hardware/software token:
Smart card:
Other (including biometrics):
None:
<-- Back to Authentication Statistic Index |