Computer: Access Control
Why do you think strong authentication must make use of two or more means of proving identity?
Please include the following below:
Identification: obtaining the identity of the entity requesting access to a logical or physical area Authentication: confirming the identity of the entity seeking access to a logical or physical area Authorization: determining which actions that entity can perform in that physical or logical area Accountability: documenting the activities of the authorized individual and system