Securing EC Communications access control Mechanism that determines who can legitimately use a network resource passive tokens Storage devices(e.g, magnetic strips) that contain a secret code used in a two-factor authentication system active tokens Small, stand-alone electronic devices that generate one-time passwords used in a two-factor authentication system Electronic Commerc Prentice Hall 2006Electronic Commerce Prentice Hall © 2006 22 Securing EC Communications access control Mechanism that determines who can legitimately use a network resource passive tokens Storage devices (e.g., magnetic strips) that contain a secret code used in a two-factor authentication system active tokens Small, stand-alone electronic devices that generate one-time passwords used in a two-factor authentication system