This category highlights weaknesses related to system resources design and structures. Neglecting these weaknesses during secure architecture development can compromise authentication quality.
This category encompasses weaknesses associated with the design and structure of system resources. These weaknesses often involve limitations on the extent to which actors can access resources, such as memory, network connections, CPU, or access points. Neglecting to address these weaknesses during the design or implementation of a secure architecture may potentially diminish the quality of authentication.