This website uses cookies to ensure you have the best experience. Learn more

The Security Authentication Process Essay

1447 words - 6 pages

The Security Authentication Process
Simply put, authentication is the process by which a subject’s (or user’s) identity is verified (Conklin, White, Williams, Davis, & Cothren, 2012). An example of authentication most people are familiar with is their e-mail login. For instance, Gmail requires a person’s Gmail address and individual password to access his or her Gmail account. However, there are numerous types of authentication outside the common username and password. Furthermore, authentication is used in numerous areas of a system to re-verify a user’s identity when he or she is accessing a new area of the system, accessing encrypted data types, and securing the preservation of a ...view middle of the document...

A bank ATM does not simply allow a person to retrieve cash by entering a PIN. Customers are required to insert their bank card at the ATM, which prompts for the PIN associated with the customer’s card after insertion. The bank card acts as the second item from the list above and is classified as something a person has. Another example of something a person has is using a Common Access Card (CAC) or smartcard to access a system and the data contained therein. Applebee’s Neighborhood Bar and Grill requires employees to carry a smartcard to gain access to their Point-of-Sale (POS) systems. The card has a magnetic strip with an employee’s information programmed into it. Simply sliding the card through a card reader provides Applebee’s employees with access to the POS system where they can do number of tasks such as clock in and out for shifts and place orders for guests.
The third type of authentication mechanism from the list is something a person is. For example, a system manufacturer may provide consumers with the option to equip their systems with biometric recognition software and hardware to prevent unauthorized access to a system and its data. This hardware may be used to recognize items such as finger, thumb, or palm prints, facial recognition, or retina or iris scans, which help to verify or authenticate a person’s identity. Types of biometric software includes Verisoft Access Manager, DigitalPersona, and HP Protect Tools, and the hardware used to verify biometrics includes cameras for facial recognition of scanners for recognizing items such as a thumb or finger prints.
Something someone produces is the fourth and final type of authentication method from the list above. Examples of things a person produces for authentication are signatures or patterns and speech or audible sounds. Android powered devices such as smartphones and tablets offer a great example of pattern recognition for authenticating a user, which comes in the form of a pattern lock. The user is shown a twelve-dot matrix in which he or she can draw a pattern by connecting the dots. If the person attempting to unlock the device does not draw the approved pattern he or she is denied access to the device. Voice recognition software is another method for verifying a user’s identity through something he or she produces. An example is a person stating their name when prompted by a system to verify his or her identity for the system.
The Authentication Process
The authentication process seems fairly easy to explain using a Personal Computer (PC). When a person sets up a PC for the first time they set up a user profile. A person selects his or her user profile to access their personal profile and data on a system. The user is given the option to set up password protection for his or her profile (something a person knows). To sign on to the PC a user selects his or her profile and enters the password associated with the profile. An invalid password...

Other Papers Like The Security Authentication Process

Applying Owasp to a Web Security Assessment

589 words - 3 pages Assessment Worksheet Applying OWASP to a Web Security Assessment Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you explored the Open Web Application

Security and Ict Essay

954 words - 4 pages purchases something from your (web)shop, how can you be sure that they are who they claim to be. For example , without authentication security, if an user loose his credit/debit card, than an unauthorized people can use it easily. Once a person has been authenticated, the authorization process begins. Authorization is usually determined by comparing information about the person with access control information. It is necessary to know that the user is

Securing and Protecting Information

1469 words - 6 pages CMGT 400 Week 3 Securing and Protecting Information Security Authentication Process It is necessary to secure your authentication method to safeguard your system against varied forms of security threats, like brute-force or wordbook attacks, impersonation of users, and reply attacks. Additionally, if you share resources on your network with alternative organizations, you need to make sure that your authentication policies are interchangeable

Computer Security Assessment

567 words - 3 pages for access control. Answer b) If MPS is to strengthen user authentication then biometric techniques will bring a definite improvement by increasing the level of security and being cost effective. That’s because biometric techniques are the authentication methods that use one or more intrinsic physical or behavioural characteristics for recognising an individual. So, there is no question of forgetting passwords or access by some other person

Atm Paper Cis-210

1188 words - 5 pages number of problems of security in the authentication process different attacks are defined inn the security, Cameras are put in the ATM room to view any security threats. Usability In ATM authentication some basic and critical errors are distinguished. Basic errors defined here that one or two times the wrong authentication attempts, and the crucial error is the third attempt by the customer, which is also wrong. ATM’s usually block the

Access Control Policy

542 words - 3 pages Associate Level Material Appendix F Access Control Policy Student Name: Christopher Waller University of Phoenix IT/244 Intro to IT Security Instructor’s Name: Romel Llarena Date: May 13, 2012 Access Control Policy Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems 1 Authentication Describe how and why

Week 7 Lab

669 words - 3 pages background process running on a UNIX or Microsoft Windows server. Diameter is an authentication, authorization, and accounting protocol for computer networks. It evolved from and replaces the much less capable RADIUS protocol that preceded it. Diameter Applications extend the base protocol by adding new commands and/or attributes, such as those for use of the Extensible Authentication Protocol (EAP). Differences between RADIUS and

Access Control

538 words - 3 pages In computer security, access control includes authentication, authorization and accountability. In access control models, the human users or software which execute actions are defined as subjects; while the resources or whatever which are intended to be protected from illegal access are designated objects. Authentication is the process of verifying the credential provider claiming who he or she is. Before a subject open an account in online

It-255 Study Guide Flash Cards

635 words - 3 pages danger.  Closing Security Gaps A laps in a security control in a policy creates a gap.  Logical access control These control access to a computer system or network.  Identification Methods The first step enforcing an authorization policy in Identification.  Linked to identification methods The second step is Authentication.  Authentication Types Knowledge, ownership

Security in E Banking

3599 words - 15 pages password on the website. It is used to steal login information of a customer. Factors of Security Any Internet banking system must solve the issues of authentication, confidentiality, integrity. While implementing security following factors must be taken into considerations: * Authenticity : Bank & client should be able to verify the identity of each other. * Confidentiality : Data should be accessible to only authorized customer

Most Significant Factor Driving the Security Screening Market

661 words - 3 pages . Biometric systems are the most popular techniques used for screening people as it is the most reliable process for authentication. Screening systems based on biometrics method include voice scanner, face scanner, retina scanner, iris scanner and fingerprint scanner. Luggage and other belongings of the people are often screened using x-ray scanning machines to check for any prohibited objects in the baggage. Growing need for security measures

Related Essays

Project Essay

348 words - 2 pages Essay Week 2 Daniel Farella I.T.T. Technical Institute Author Note: This essay is being submitted on 5/9/2013 for Earl Robinson intorduction to security class. Essay week 2 * The remote access control policy consists of * Group membership  * Type of connection  * Time of day  * Authentication methods  * Advanced conditions:  * Access server identity  * Access client phone number or MAC address

Securing And Protecting Information Essay

1292 words - 6 pages provider or ISP which is connecting remotely to the resources online. Secure connectivity is able to be done due to an authentication process, this process establishes a user’s identification to enable access and grant permissions. There are several ways to establish a network connection based on the software, hardware, and network type and security requirements. Security authentication Wireless devices are able to connect remotely involving two

Access Control Policy Essay

1684 words - 7 pages system keeps a record of this authentication, which is used each time the user logs in. More modern authentication techniques are available. Single sign on, or SSO refers to the ability of a user to only be authenticated once and to be provided authorization to multiple services. This authentication process permits a user to enter one name and password to be able to access all applications he or she has been given rights to and eliminates

Disaster Recovery Plan Essay

590 words - 3 pages | Enhanced Security for Data Access | | Richard Edvalson 1/12/2014 | Contents I. Contents 1 II. Introduction 5 III. Access Control Layers 5 A. The Access Control Perimeter 5 B. Asset Containers 5 C. Workplace Perimeter 5 IV. Access Control Methods and Technical Strategies 5 A. Identification, Authentication, and Authorization 5 B. Logical Access Controls 5 1. Network Architecture Controls 5 2