Related resources for Security Steps for Strong Authentication
  • Security Steps for Strong Authentication1/29/2007 11:55:30 PM. Weak authentication increases the identity spoofing threat. If a user’s logon credentials fall into the wrong hands, an attacker can spoof the user’s identity and gain access to the application. The attacker shares all of the user’s privileges in the application. Credentials must be protected as they are passed over the network and while they are persistent