You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Uncertainties surround the methods employed by software for user identification, raising questions about the security, accuracy, and privacy implications of the identification process. Additionally, this also affects all aspects of access control used within the software system.
In a banking app login, questions arise about how users are verified—via passwords, biometrics, or multi-factor authentication and whether this identification is sufficient for access control.
sebinside
added
accepted
Uncertainty was manually verified and entered into the archive
and removed
proposal
A proposed uncertainty that was not yet verified and added to the archive
labels
Feb 26, 2024
How is user identification performed?
Description
Uncertainties surround the methods employed by software for user identification, raising questions about the security, accuracy, and privacy implications of the identification process. Additionally, this also affects all aspects of access control used within the software system.Literature Reference
Classifications
Keywords
TrustExample
In a banking app login, questions arise about how users are verified—via passwords, biometrics, or multi-factor authentication and whether this identification is sufficient for access control.Related Uncertainties
Parent:
#55Related Uncertainties:
#34, #32, #62, #80The text was updated successfully, but these errors were encountered: