Wednesday, August 15, 2012

Computer Security Authentication

Computer security authentication means verifying the identity of a user logging onto a network. Passwords, digital certificates, smart cards and biometrics can be used to prove the identity of the user to the network. Computer security authentication includes verifying message integrity, e-mail authentication and MAC (Message Authentication Code), checking the integrity of a transmitted message. There are human authentication, challenge-response authentication, password, digital signature, IP spoofing and biometrics.

Human authentication is the verification that a person initiated the transaction, not the computer. Challenge-response authentication is an authentication method used to prove the identity of a user logging onto the network. When a user logs on, the network access server (NAS), wireless access point or authentication server creates a challenge, typically a random number sent to the client machine. The client software uses its password to encrypt the challenge through an encryption algorithm or a one-way hash function and sends the result back to the network. This is the response.

Networking

USA Shop Search CA Direct Search Top Views Search Search Info Plus Gift Options E-Shop Options Option Plus Your Shop Station We Love Reviews E-Shops Big Fan Resale Big Fan A Stores Trade 24Hrs Retail Store A Best Display Ausie Shop List Shop For Easy Shop For Luxury Shop ConCept Oversea Concept Boston Shopping Shopping Secrets Smart Shopping Advance How To Free Shop Secrets Pop up Shopping Best Pop up Cart Add To Carts Smart E-Carts Retailer Cart Store Secrets Top Shopping Cart

Two- factor authentication requires two independent ways to establish identity and privileges. The method of using more than one factor of authentication is also called strong authentication. This contrasts with traditional password authentication, requiring only one factor in order to gain access to a system. Password is a secret word or code used to serve as a security measure against unauthorized access to data. It is normally managed by the operating system or DBMS. However, a computer can only verify the legality of the password, not the legality of the user.

Computer Security Authentication

The two major applications of digital signatures are for setting up a secure connection to a website and verifying the integrity of files transmitted. IP spoofing refers to inserting the IP address of an authorized user into the transmission of an unauthorized user in order to gain illegal access to a computer system.

Biometrics is a more secure form of authentication than typing passwords or even using smart cards that can be stolen. However, some ways have relatively high failure rates. For example, fingerprints can be captured from a water glass and fool scanners.

Computer Security Authentication

Computer Security provides detailed information on Computer Security, Computer Security Systems, Computer Network Securities, Computer Security Software and more. Computer Security is affiliated with Information Security Systems [http://www.e-InformationSecurity.com].

watches cell phone Buy New 6 Portable Park Bench Without Back

No comments:

Post a Comment