Skip to main content

Current Use of User Authentication

  • Chapter
  • First Online:
Transparent User Authentication

Abstract

Information security has become increasingly important as technology integrates into our everyday lives. In the past 10 years, computing-based technology has ­permeated every aspect of our lives from desktop computers, laptops and mobile phones to satellite navigation, MP3 players and game consoles. Whilst the motivation for keeping systems secure has changed from the early days of mainframe systems and the need to ensure reliable audits for accounting purposes, the underlying requirement for a high level of security has always been present.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    These figures were compiled from the Computer Security Institutes (CSI) annual Computer Crime and Abuse Survey (which until 2008 was jointly produced by the Federal Bureau of Investigation (FBI)) between the period 2001 and 2010 (CSI, 2001-2010).

References

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nathan Clarke .

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag London Limited

About this chapter

Cite this chapter

Clarke, N. (2011). Current Use of User Authentication. In: Transparent User Authentication. Springer, London. https://doi.org/10.1007/978-0-85729-805-8_1

Download citation

  • DOI: https://doi.org/10.1007/978-0-85729-805-8_1

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-0-85729-804-1

  • Online ISBN: 978-0-85729-805-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics