Loading…

How To Control Dial-Up Access

Increasingly, companies are allowing users to access the host computer through the use of a telephone and a modem. Demands are being made for greater control over user identification and password management. Challenge/response type technology provides excellent user authentication and remains reason...

Full description

Saved in:
Bibliographic Details
Published in:I.T. magazine (Toronto) 1989-02, Vol.21 (2), p.36
Main Author: Lewis, Barry D
Format: Article
Language:English
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Increasingly, companies are allowing users to access the host computer through the use of a telephone and a modem. Demands are being made for greater control over user identification and password management. Challenge/response type technology provides excellent user authentication and remains reasonably unobtrusive. Although there are other control devices and technologies, the challenge/response format provides the most reasonable approach to user authentication, based on its proven flexibility and comparatively low cost. The 3 main considerations related to the use of a challenge/response system are: 1. device administration, 2. most software/hardware requirements, and 3. user training and awareness. Some up-front effort will be needed to develop policies and procedures needed to manage dial-up access. Time also will be required to establish suitable controls and user training.
ISSN:1196-4715