Claim Missing Document
Check
Articles

Found 2 Documents
Search

Multi-factor Authentication and their Approaches Singh, Saroj
International Research Journal of Management, IT & Social Sciences (IRJMIS) Vol 4 No 3: May 2017
Publisher : IJCU

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21744/irjmis.v4i3.464

Abstract

Multi-factor authentication is an approach to authentication which requires the presentation of two or more of the three authentication factors: a knowledge factor ("something the user knows"), a possession factor ("something the user has"), and an inherence factor ("something the user is")...
IP Security Singh, Saroj
International Research Journal of Management, IT & Social Sciences (IRJMIS) Vol 3 No 3: March 2016
Publisher : IJCU

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21744/irjmis.v3i3.95

Abstract

IP is stands for Internet Protocol. IP security is a set service which secures the documents by the unauthorized entity. IP Sec covers the three areas of functionality that is authentication, confidentiality, and key management. IP Sec encrypts and authenticates all the data traffic at the IP level security. The IP level security or firewall administrator, we got basically the same concerns (as plumber) the size of the pipe the contents of the pipe, making sure the correct traffic is in the correct pipes and keeping the pipes from splitting and leaking all over the places of course like plumbers. When the pipes do leak: we are the ones responsible for cleaning up the mess and we are the ones who come up smelling awful. Firewall is a device that is used to provide protection to a system from network based security threats. Firewall uses service, behavior, user and direction control techniques.Â