Types of remote access authentication in use by UK businesses
Study: 2002 Information Security Breaches Survey Date: 2002 What security controls are typically in place over remote access? Additional passwords over and above the normal network sign-on:
Two-factor authentication (i.e. hardware or software tokens as well as passwords):
Digital certificates (e.g. PKI):
<-- Back to Authentication Statistic Index |