In the emerging economy there is a new infrastructure, based on the internet, that is causing us to scrutinies most of our assumptions about the business. As a skin of networks - growing in ubiquity, robustness, bandwidth, and function - covers the skin of the planet, new models of how wealth is created are emerging.

Wednesday, June 4, 2014

Authentication system

There are three main security processes working together to provide access to assess in a controlled manner:
*Authentication
*Authorization
*Accounting

The first line of defense of a computer system has against intruders is the user authentication system. Much like with a normal door lock, authorized users are given a key to the system thus keeping unauthorized users out.

The user authentication system attempts to prevent unauthorized users from gaining access by requiring users to validate their authorization to use the system.

Authentication is the process of validating user identity. The fact that the user claims to be represented by a specific abstract object (identified by its user ID) does not necessarily mean that this is true.

This validation is often accomplished with use of a password that must be presented to the system.

The system grants access to a user only when the password for the specified username matches the password on record.

Other authentication schemes require the user to present a physical key or take advantage of the uniqueness of as user’s physical characteristics such as fingerprints.

Questionnaire authentication attempts to validate a user with questions that an intruder is unlikely to know.

The system asks questions such as the name of the user’s first pet, the color of the user’s parent’s home or the name of the user’s favorite teacher.

Once the individual has been authenticated, the system will associate an initial process to the user and the user will be able to launch other processes.
Authentication system

The most popular articles

My Blog List