A Token is an information security hardware device that is in the possession of a user. The implement is primarily used for authentication and is associated with “something that a user has”. The device, typically, is used as only one layer of a multi-layered system of authentication. Some even randomly generate a one-time access number to be entered into the system. Others have electronic information recorded upon them and are read once the device is put into the appropriate access port.
Its Relevance: A business or an organization, to practice due diligence, must have policies that govern the access of information resources. One very robust method uses a device that remains in the possession of the user and must be plugged-in before access is granted.
Return from "Token" to Words [S - U]