Network System Security: M2 - Suggest how users can be ... [PDF]

May 28, 2013 - Different Types of Access Security Identification - This is when somebody says who they are. Authenticati

2 downloads 22 Views 62KB Size

Recommend Stories


How Simple Can Gravity Be?
I tried to make sense of the Four Books, until love arrived, and it all became a single syllable. Yunus

How can Mecca be saved?
When you talk, you are only repeating what you already know. But if you listen, you may learn something

How can we support users' preferential choice?
Almost everything will work again if you unplug it for a few minutes, including you. Anne Lamott

How can Guidance Work be Organized
The wound is the place where the Light enters you. Rumi

How binding can an EU referendum be?
Don’t grieve. Anything you lose comes round in another form. Rumi

How Efficient can Memory Checking be?
No amount of guilt can solve the past, and no amount of anxiety can change the future. Anonymous

How Constitutional Can the European Union Be?
You have to expect things of yourself before you can do them. Michael Jordan

How can original sin be inherited?
Learn to light a candle in the darkest moments of someone’s life. Be the light that helps others see; i

New technology & how it can be used
Your big opportunity may be right where you are now. Napoleon Hill

How Can Evangelical Celibacy be Authentic?
We may have all come on different ships, but we're in the same boat now. M.L.King

Idea Transcript


Network System Security By Lee Lappage All Blog Posts

P1

P2

P3

M1

M2

M3

D1

D2

Tuesday, 28 May 2013

About Me

M2 - Suggest how users can be authenticated to gain access to a networked system

Lee Lappage Colchester, United Kingdom

Different Types of Access Security

View my complete profile

Identification - This is when somebody says who they are. Authentication - This is when somebody proves they are who they say they are, this is usually through some form of ID, i.e. Passport or Driving License. Authorisation - This is when somebody gives you permission to do something. Two Factor Standard Of Authentication Two factor standard of authentication is when two different types of proof is necessary. For example when withdrawing money from an ATM you would need a valid debit card and the corresponding PIN number. Two factor standard of authentication is better and far more secure than one factor standard authentication because it requires the attacker to gain two different types of authentication which is much harder than finding out just one. Username/Password This method requires the user to provide a valid username and corresponding password, if either of these is incorrect they will be denied access. This is a good method of authentication because it requires two pieces of confidential information, which can both be updated and changed regularly to keep the account secure. An advantage of using this method of authentication is that there is nothing physical that an attacker can steal, such as an ID card or key. However, a disadvantage of this method is if an attacker got hold of your password (either through a keylogger or by looking over your shoulder, for example.) it would be very easy to gain access to your account. Biometrics Authentication Biometrics is a very unique method of authentication, this is because it can either make decisions based on the users behaviour or their physical attributes. I.e fingerprints, Retina Scan, Palm scan. These are all things an attacker can not physically steal or easily forge, which is what makes this method so secure. The disadvantages of this method are that it is very expensive to set up and maintain and it can also be more time consuming than simply entering a password.

Digital Certificate A digital certificate is an attachment put on an electronic message as a method of authenticating the person sending the message. The certificate must be obtained through a recognized certificate authority. It basically means when someone is sending personal information it is encrypted, this is important for information such as credit card numbers etc when making online purchases. The information is then decrypted once it has been sent via the digital certificate. The main advantage of this being when a user is entering confidential information they know they can trust the website. One of the disadvantages is that it can be expensive to maintain.

Posted by Lee Lappage

Newer Post

Home

My names Lee Lappage, I'm 18 years old and currently studying for a BTEC Level 3 Extended Diploma in ICT.

Older Post

Awesome Inc. theme. Powered by Blogger.

Smile Life

When life gives you a hundred reasons to cry, show life that you have a thousand reasons to smile

Get in touch

© Copyright 2015 - 2024 PDFFOX.COM - All rights reserved.