Enhance multi-factor authentication model for intelligence community access to critical surveillance data

4Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Protection of critical data is one of the greatest challenges in any organization around the globe, especially for the intelligence community. Managing data, assets and resources require strong security method such as the authentication process that can guarantee only designated person will be receiving the required information. Any breach of information and assets could risk in the nation’s sovereignty and give significant impacts in social, political, economy and diplomacy or even lives. Authentication method enables intelligence data to be transferred covertly and the access to the system by a legitimate user is guaranteed, hence the elements of confidentiality, integrity, and availability of the data is assured. This study analyzed various authentication methods used to secure multiple platforms of data and system. This study serves as theoretical analysis on multi-factor authentication model for intelligence community access to critical surveillance data. This study aims to propose the enhance model that could be used as a basis to build a framework of the secured authentication system to avoid common attack on authentication and access management.

Cite

CITATION STYLE

APA

Wan Muhamad, W. N., Mat Razali, N. A., Ishak, K. K., Hasbullah, N. A., Mohd Zainudin, N., Ramli, S., … MSaad, N. J. A. (2019). Enhance multi-factor authentication model for intelligence community access to critical surveillance data. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11870 LNCS, pp. 560–569). Springer. https://doi.org/10.1007/978-3-030-34032-2_49

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free