Abstract
Information security within enterprises has endured the systems and services in order to protect all the information generated. Among the tools currently adopted worldwide to comply with information security is the implementation of AAA systems, which are used to authenticate users, grant access to the network and account the events generated in the network, particularly for authentication success and failures. The latter is the interest for this journal. Hence, a research is developed in an enterprise to reveal the reasons for failures, solutions and feasibility of application which empowers the company to improve authentication systems and, consequently, information security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
John, G., David, R.: The digital-universe in 2020, vol. 2007, pp. 1–16 (2012)
Hao, T.: The information security analysis of digital library. In: ICICTA 2015, pp. 983–984 (2016)
Wangen, G.: Information security risk assessment: a method comparison. Computer 50(4), 52–61 (2017)
Servicio de rentas internas (SRI): Distributivo de personal - Servicio de Rentas Internas del Ecuador (2014). http://www.sri.gob.ec/web/guest/distributivo-de-personal2. Accessed 28 Nov 2018
Al, S.: The triple-a approach to enterprise IT security | Enterprise Security | E-Commerce Times (2013). https://www.ecommercetimes.com/story/76987.html. Accessed 28 Nov 2018
Sasan, A., Bin, L., Pin-Han, H., Shervin, E.: Authentication authorization and accounting (AAA) schemes in WiMAX, pp. 210–215
Lucía, L.: Explicativo sobre el cumplimiento del proceso de la reinversión de utilidades como requisito previo para la disminución en el pago del impuesto a la renta (2017)
Microsoft: Account policies (2009). https://docs.microsoft.com/en-us/previous-versions/tn-archive/dd277398(v%3Dtechnet.10). Accessed 28 Nov 2018
Cisco Community (a): Cisco ISE Machine failed machine authentication (2014). https://community.cisco.com/t5/policy-and-access/cisco-ise-machine-failed-machine-authentication/td-p/2437971. Accessed 29 Nov 2018
Cisco community (b): Configuring AAA, pp. 1–18
Serverfaul Community: Cisco ISE Wlan user authentication fails for users with umlaut (2018). https://serverfault.com/questions/462565/cisco-ise-wlan-user-authentication-fails-for-users-with-umlaut. Accessed 29 Nov 2018
Cisco community (c): CoA is not working using Cisco ISE 1.1 (2012). https://community.cisco.com/t5/policy-and-access/coa-is-not-working-using-cisco-ise-1-1/td-p/2105702. Accessed 29 Nov 2018
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Posso, R., Criollo-C, S. (2019). Analysis of Authentication Failures in the Enterprise. In: Rocha, Á., Adeli, H., Reis, L., Costanzo, S. (eds) New Knowledge in Information Systems and Technologies. WorldCIST'19 2019. Advances in Intelligent Systems and Computing, vol 931. Springer, Cham. https://doi.org/10.1007/978-3-030-16184-2_86
Download citation
DOI: https://doi.org/10.1007/978-3-030-16184-2_86
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-16183-5
Online ISBN: 978-3-030-16184-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)