Skip to main content

Analysis of Authentication Failures in the Enterprise

  • Conference paper
  • First Online:
New Knowledge in Information Systems and Technologies (WorldCIST'19 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 931))

Included in the following conference series:

  • 1945 Accesses

Abstract

Information security within enterprises has endured the systems and services in order to protect all the information generated. Among the tools currently adopted worldwide to comply with information security is the implementation of AAA systems, which are used to authenticate users, grant access to the network and account the events generated in the network, particularly for authentication success and failures. The latter is the interest for this journal. Hence, a research is developed in an enterprise to reveal the reasons for failures, solutions and feasibility of application which empowers the company to improve authentication systems and, consequently, information security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. John, G., David, R.: The digital-universe in 2020, vol. 2007, pp. 1–16 (2012)

    Google Scholar 

  2. Hao, T.: The information security analysis of digital library. In: ICICTA 2015, pp. 983–984 (2016)

    Google Scholar 

  3. Wangen, G.: Information security risk assessment: a method comparison. Computer 50(4), 52–61 (2017)

    Article  Google Scholar 

  4. Servicio de rentas internas (SRI): Distributivo de personal - Servicio de Rentas Internas del Ecuador (2014). http://www.sri.gob.ec/web/guest/distributivo-de-personal2. Accessed 28 Nov 2018

  5. Al, S.: The triple-a approach to enterprise IT security | Enterprise Security | E-Commerce Times (2013). https://www.ecommercetimes.com/story/76987.html. Accessed 28 Nov 2018

  6. Sasan, A., Bin, L., Pin-Han, H., Shervin, E.: Authentication authorization and accounting (AAA) schemes in WiMAX, pp. 210–215

    Google Scholar 

  7. Lucía, L.: Explicativo sobre el cumplimiento del proceso de la reinversión de utilidades como requisito previo para la disminución en el pago del impuesto a la renta (2017)

    Google Scholar 

  8. Microsoft: Account policies (2009). https://docs.microsoft.com/en-us/previous-versions/tn-archive/dd277398(v%3Dtechnet.10). Accessed 28 Nov 2018

  9. Cisco Community (a): Cisco ISE Machine failed machine authentication (2014). https://community.cisco.com/t5/policy-and-access/cisco-ise-machine-failed-machine-authentication/td-p/2437971. Accessed 29 Nov 2018

  10. Cisco community (b): Configuring AAA, pp. 1–18

    Google Scholar 

  11. Serverfaul Community: Cisco ISE Wlan user authentication fails for users with umlaut (2018). https://serverfault.com/questions/462565/cisco-ise-wlan-user-authentication-fails-for-users-with-umlaut. Accessed 29 Nov 2018

  12. Cisco community (c): CoA is not working using Cisco ISE 1.1 (2012). https://community.cisco.com/t5/policy-and-access/coa-is-not-working-using-cisco-ise-1-1/td-p/2105702. Accessed 29 Nov 2018

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Richard Posso .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Posso, R., Criollo-C, S. (2019). Analysis of Authentication Failures in the Enterprise. In: Rocha, Á., Adeli, H., Reis, L., Costanzo, S. (eds) New Knowledge in Information Systems and Technologies. WorldCIST'19 2019. Advances in Intelligent Systems and Computing, vol 931. Springer, Cham. https://doi.org/10.1007/978-3-030-16184-2_86

Download citation

Publish with us

Policies and ethics