Category Archives: Authentication

IT Security Concepts

IT Security Concepts


This document is an attempt to formulate basic reasoning behind security technologies, we should employ. It is not trying to analyse the actual techniques used and tries to stay away from technology comparisons. I apologize for some of the analogies that may sound infantile. The reason for this is two-fold: it may help to explain the concept to a non-technical reader, but also, I found that using simple analogies may sometimes expose holes in our thinking.

Why use security systems

It is quite obvious that any security system has a cost, not only in terms of cash, but also – more significantly –

Read more ...

Two Factor Auth List. Contact them if your service is not supported.