Abstract
Information security has become increasingly important as technology integrates into our everyday lives. In the past 10 years, computing-based technology has permeated every aspect of our lives from desktop computers, laptops and mobile phones to satellite navigation, MP3 players and game consoles. Whilst the motivation for keeping systems secure has changed from the early days of mainframe systems and the need to ensure reliable audits for accounting purposes, the underlying requirement for a high level of security has always been present.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
These figures were compiled from the Computer Security Institutes (CSI) annual Computer Crime and Abuse Survey (which until 2008 was jointly produced by the Federal Bureau of Investigation (FBI)) between the period 2001 and 2010 (CSI, 2001-2010).
References
AccessData: AccessData password recovery toolkit. AccessData. Available at: http://accessdata.com/products/forensic-investigation/decryption (2011). Accessed 10 Apr 2011
APACS: Fraud: The facts 2008. Association for payment clearing services. Available at: http://www.cardwatch.org.uk/images/uploads/publications/Fruad%20Facts%20202008_links.pdf (2008). Accessed 10 Apr 2011
Ashbourn, J.: Biometrics: Advanced Identity Verification: The Complete Guide. Springer, London (2000). ISBN 978-1852332433
BBC: Credit card cloning. BBC inside out. Available at: http://www.bbc.co.uk/insideout/east/series3/credit_card_cloning.shtml (2003). Accessed 10 Apr 2011
BBC: Passwords revealed by sweet deal. BBC News. Available at: http://news.bbc.co.uk/1/hi/technology/3639679.stm (2004). Accessed 10 Apr 2011
BBC: Personal data privacy at risk. BBC News. Available at: http://news.bbc.co.uk/1/hi/business/7256440.stm (2008a). Accessed 10 Apr 2011
BBC: Oyster card hack to be published. BBC News. Available at: http://news.bbc.co.uk/1/hi/technology/7516869.stm (2008b). Accessed 10 Apr 2011
Clarke, N.L., Furnell, S.M.: Authentication of users on mobile telephones – A survey of attitudes and opinions. Comput. Secur. 24(7), 519–527 (2005)
Crown Copyright: Computer misuse act. Crown copyright. Available at: http://www.legislation.gov.uk/ukpga/1990/18/contents (1990). Accessed 10 Apr 2011
Crown Copyright: Data protection act 1988. Crown copyright. Available at: http://www.legislation.gov.uk/ukpga/1998/29/contents (1998). Accessed 10 Apr 2011
Crown Copyright: Regulation of investigatory powers act. Crown copyright. Available at: http://www.legislation.gov.uk/ukpga/2000/23/contents (2000a). Accessed 10 Apr 2011
Crown Copyright: Electronic communication act. Crown copyright. Available at: http://www.legislation.gov.uk/ukpga/2000/7/contents (2000b). Accessed 10 Apr 2011
Crown Copyright: Police and justice act. Crown copyright. Available at: http://www.legislation.gov.uk/ukpga/2006/48/contents (2006). Accessed 10 Apr 2011
de Winter, B.: New hack trashes London’s Oyster card. Tech world. Available at: http://news.techworld.com/security/105337/new-hack-trashes-londons-oyster-card/ (2008). Accessed 10 Apr 2011
Deyal, G.: MiFare RFID crack more extensive than previously thought. Computer world. Available at: http://www.computerworld.com/s/article/9078038/MiFare_RFID_crack_more_extensive_than_previously_thought (2008). Accessed 10 Apr 2011
Espiner, T.: Chip and PIN is broken, says researchers. ZDNet UK. Available at: http://www.zdnet.co.uk/news/security-threats/2010/02/11/chip-and-pin-is-broken-say-researchers-40022674/ (2010). Accessed 3 Aug 2010
Furnell, S.M.: Computer Insecurity: Risking the System. Springer, London (2005). ISBN 978-1-85233-943-2
IBG: How is biometrics defined? International Biometrics Group. Available at: http://www.biometricgroup.com/reports/public/reports/biometric_definition.html (2010a). Accessed 10 Apr 2011
Imperva: Consumer password worst practices. Imperva Application Defense Centre. Available at: http://www.imperva.com/docs/WP_Consumer_Password_Worst_Practices.pdf (2010). Accessed 10 Apr 2011
ISO: ISO/IEC 27002:2005 information technology – Security techniques – Code of practice for information security management. International Standards Organisation. Available at: http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=50297 (2005a). Accessed 10 Apr 2011
Kent, J.: Malaysia car thieves steal finger. BBC News. Available at: http://news.bbc.co.uk/1/hi/world/asia-pacific/4396831.stm (2005). Accessed 10 Apr 2011
Kissel, B.: OpenID 2009 year in review. OpenID Foundation. Available at: http://openid.net/2009/12/16/openid-2009-year-in-review/ (2009). Accessed 10 Apr 2011
Matsumoto, T., Matsumoto, H., Yamada, K., Hoshino, S.: Impact of artificial ‘gummy’ fingers on fingerprint systems. Proc. SPiE 4677, 275–289 (2002)
Michael, S.: Facial recognition fails at Black Hat. eSecurity planet. Available at: http://www.esecurityplanet.com/trends/article.php/3805011/Facial-Recognition-Fails-at-Black-Hat.htm (2009). Accessed 10 Apr 2011
NatWest.: The secure way to get more from online banking. NatWest Bank. Available at: http://www.natwest.com/personal/online-banking/g1/banking-safely-online/card-reader.ashx (2010). Accessed 10 Apr 2011
Ophcrack.: What is ophcrack?. Sourceforge. Available at: http://ophcrack.sourceforge.net/ (2011). Accessed 10 Apr 2011
Schneier, B.: Real-world passwords. Bruce Schneier Blog. Available at: http://www.schneier.com/blog/archives/2006/12/realworld_passw.html (2006). Accessed 10 Apr 2011
Security Focus.: @Stake LC5. Security focus. Available at: http://www.securityfocus.com/tools/1005 (2010). Accessed 10 April 2011
Wood, H.: The use of passwords for controlling the access to remote computer systems and services. In: Dinardo, C.T. (ed.) Computers and Security, vol. 3, p. 137. AFIPS Press, Montvale (1977)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2011 Springer-Verlag London Limited
About this chapter
Cite this chapter
Clarke, N. (2011). Current Use of User Authentication. In: Transparent User Authentication. Springer, London. https://doi.org/10.1007/978-0-85729-805-8_1
Download citation
DOI: https://doi.org/10.1007/978-0-85729-805-8_1
Published:
Publisher Name: Springer, London
Print ISBN: 978-0-85729-804-1
Online ISBN: 978-0-85729-805-8
eBook Packages: Computer ScienceComputer Science (R0)