2 cissp ® Official Study Guide Eighth Edition


Registration and Proofing of Identity



Download 19,3 Mb.
Pdf ko'rish
bet545/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   541   542   543   544   545   546   547   548   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Registration and Proofing of Identity 
The registration process occurs when a user is fi rst given an identity. Within an organiza-
tion, new employees prove their identity with appropriate documentation during the hiring 
process. Personnel within a human resources (HR) department then begin the process of 
creating their user ID. 
Registration is more complex with more secure authentication methods. For example, if 
the organization uses fi ngerprinting as a biometric method for authentication, registration 
includes capturing user fi ngerprints. 
Identity proofi ng is a little different for users interacting with online sites, such as an 
online banking site. When a user fi rst tries to create an account, the bank will take extra 
steps to validate the user’s identity. This normally entails asking the user to provide infor-
mation that is known to the user and the bank such as account numbers and personal 
information about the user such as a national identifi cation number or social security 
number. 
During this initial registration process, the bank will also ask the user to provide addi-
tional information, such as the user’s favorite color, the middle name of their oldest sibling, 
or the model of their fi rst car. Later, if the user needs to change their password or wants to 
transfer money, the bank can challenge the user with these questions as a method of iden-
tity proofi ng. 
Many organizations, such as fi nancial institutions, often use more advanced proofi ng 
techniques. They gather information from customers and then verify the accuracy of this 
information using national databases. These databases allow the organization to verify 


586
Chapter 13 

Managing Identity and Authentication
items such as current and previous addresses, employers, and credit history. In some cases, 
the proofing process gives the user a multiple-choice question such as “Which of the fol-
lowing banks holds your mortgage?” or “Which of the following is closest to your current 
mortgage payment?”

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   541   542   543   544   545   546   547   548   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish