The IT Law Wiki

Overview[]

Advanced authentication refers to

[d]efinitively identifying users before they access an organization’s network is a key component in protecting information resources. Start by choosing an authentication system with encrypted password protocols. Before choosing an advanced authentication system, it is imperative that data owners evaluate user access, hardware, and other requirements.[1]

References[]

  1. Criminal Intelligence Glossary (Nov. 2004).

See also[]