Loading…
How To Control Dial-Up Access
Increasingly, companies are allowing users to access the host computer through the use of a telephone and a modem. Demands are being made for greater control over user identification and password management. Challenge/response type technology provides excellent user authentication and remains reason...
Saved in:
Published in: | I.T. magazine (Toronto) 1989-02, Vol.21 (2), p.36 |
---|---|
Main Author: | |
Format: | Article |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Increasingly, companies are allowing users to access the host computer through the use of a telephone and a modem. Demands are being made for greater control over user identification and password management. Challenge/response type technology provides excellent user authentication and remains reasonably unobtrusive. Although there are other control devices and technologies, the challenge/response format provides the most reasonable approach to user authentication, based on its proven flexibility and comparatively low cost. The 3 main considerations related to the use of a challenge/response system are: 1. device administration, 2. most software/hardware requirements, and 3. user training and awareness. Some up-front effort will be needed to develop policies and procedures needed to manage dial-up access. Time also will be required to establish suitable controls and user training. |
---|---|
ISSN: | 1196-4715 |