Shibboleth (computer security)

Shibboleth (computer security)

Within the field of computer security, the word shibboleth is sometimes used fact|date=December 2007 with a different meaning than the usual meaning of verbal, linguistic differentiation. The general concept of shibboleth is to test something, and based on that response to take a particular course of action. This principle is frequently used in computer security. The most commonly seen usage is logging on to a computer with a password. If the password is entered correctly, the user can log on to the computer; if the password entered is incorrect password, access is blocked.

There are various classes of computer security-related shibboleth.

* Class 1: Something known; perhaps a password or another fact.
* Class 2: Something held; a card or a physical tag of some kind.
* Class 3: Something that is; a biometric feature such as a fingerprint or an iris scan.

The three classes are also jokingly referred to as "something you forget," "something you lose," and "something you cease to be."

In general, it is considered more secure to combine various classes of shibboleth, rather than using the approach of just requiring a class 1 shibboleth that is common today. So for example, a high security system might require an authorized user to login by entering a password, providing an encoded card, and passing a biometric test.

ee also

* Shibboleth (Internet2)


Wikimedia Foundation. 2010.

Игры ⚽ Нужно решить контрольную?

Look at other dictionaries:

  • Shibboleth (disambiguation) — Shibboleth may refer to: * Shibboleth, any language usage indicative of one s social or regional origin, or more broadly, any practice that identifies members of a group * Shibboleth (artwork), a 2007 artwork by Doris Salcedo in Tate Modern *… …   Wikipedia

  • List of shibboleths — Below are listed various examples of shibboleths. Note that many apocryphal shibboleths exist, and that since, by definition, shibboleths rely on stereotypical pronunciation traits, they may not accurately describe the speech of all members of… …   Wikipedia

  • Hacker (computing) — In computing, hacker has several meanings: [cite web|url=http://webzone.k3.mah.se/k3jolo/HackerCultures/origins.htm|title=webzone.k3.mah.se/k3jolo/HackerCultures/origins.htm ] * A community of enthusiast computer programmers and systems designers …   Wikipedia

  • Password — For other uses, see Password (disambiguation). A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password… …   Wikipedia

  • PERMIS — (PrivilEge and Role Management Infrastructure Standards) is a sophisticated policy based authorisation system that implements an enhanced version of the U.S. National Institute of Standards and Technology (NIST) standard Role Based Access Control …   Wikipedia

  • CoSign single sign on — Developer(s) Research Systems Unix Group Operating system Cross platform Website …   Wikipedia

  • United States — a republic in the N Western Hemisphere comprising 48 conterminous states, the District of Columbia, and Alaska in North America, and Hawaii in the N Pacific. 267,954,767; conterminous United States, 3,022,387 sq. mi. (7,827,982 sq. km); with… …   Universalium

  • Perl — This article is about the programming language. For other uses, see Perl (disambiguation). Perl Paradig …   Wikipedia

  • Valley of Peace initiative — Valley of Peace redirects here. For the 1955 film, see Valley of Peace (film). The Valley of Peace initiative is an effort to promote economic cooperation between Israel, Jordan and the Palestinians. It has received the personal attention and… …   Wikipedia

  • Identity management — In information systems, identity management is the management of the identity life cycle of entities (subjects or objects). An identity management system: # Establishes the identity ## Links a name (or number) with the subject or object; ## Re… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”