Online, however, just because the right person logs into a site or service, that doesn’t guarantee that you’re still dealing with that same person later in the transaction. Unfortunately, sometimes computers are left unattended without logging out. That’s why, when really sensitive information is involved, there’s a strong case to be made for continuous verification of user identity. Lenny Zeltser talks about that, and gives some examples of ways continuous authentication could be accomplished, in this blog post:
About The Author
Debra Littlejohn Shinder is a technology and security analyst and author specializing in identity, security and cybercrime, utilizing her past experience as a police officer and police academy/criminal justice instructor. She has written numerous books and articles for web and print publications and has been awarded the Microsoft MVP designation for fourteen years in a row.