Technologies or practices used to protect critical data and information systems from unauthorized access

Study: The State of IT Security 2003
Date: July 2003

Technologies or practices in use to protect critical data and information systems from unauthorized access:
  • 89%
  • User passwords
  • 5%
  • Biometrics
  • 20%
  • One-time passwords/smart cards/tokens
  • 11%
  • PKI with internal certificate authority
  • 9%
  • PKI with external certificate authority
  • 52%
  • Multiple log on/passwords
  • 27%
  • Single sign-on
  • 27%
  • Levels of authentication based on risk classification
  • 34%
  • Role Based Access Control




    <-- Back to Authentication Statistic Index





    [Home] [About Us] [News] [Research]

    Copyright © 2017 PasswordResearch.com