*Authentication
*Authorization
*Accounting
The first line of defense of a computer system has against intruders is the user authentication system. Much like with a normal door lock, authorized users are given a key to the system thus keeping unauthorized users out.
The user authentication system attempts to prevent unauthorized users from gaining access by requiring users to validate their authorization to use the system.
Authentication is the process of validating user identity. The fact that the user claims to be represented by a specific abstract object (identified by its user ID) does not necessarily mean that this is true.
This validation is often accomplished with use of a password that must be presented to the system.
The system grants access to a user only when the password for the specified username matches the password on record.
Other authentication schemes require the user to present a physical key or take advantage of the uniqueness of as user’s physical characteristics such as fingerprints.
Questionnaire authentication attempts to validate a user with questions that an intruder is unlikely to know.
The system asks questions such as the name of the user’s first pet, the color of the user’s parent’s home or the name of the user’s favorite teacher.
Once the individual has been authenticated, the system will associate an initial process to the user and the user will be able to launch other processes.
Authentication system