Discussion

Context-Aware Security

10 unread replies.11 replies.

Context-aware security dictates rules that apply to the authentication process. These rules take into consideration, not just the users details but which device that person is using and even the location and time. By considering these extra criteria, security administrators can apply different access rights and authorization to different contexts. For example, a context-aware security device identifies the user (who), the application or website that the user is attempting to access (what), the time of the access attempt (when), the location or origin of the request (where), and the device on which the request has been made (how). 


Answer the following question(s): 


In an enterprise environment with thousands of users and devices, is context-aware security practical? Why or why not?