Computer Security Authentication

security authentication means verifying the identity of a user accessing a network. Passwords, digital certificates, smart cards and biometrics are the network can prove the identity of the user. Computer Security Authentication is to verify the integrity of the message, the e-mail authentication and MAC (Message Authentication Code), the verifying the integrity of the message transmitted. There are people of authentication, challenge-response authentication, password,Digital signature, IP spoofing and biometrics.

Human authentication is to verify that a person who started the computer transaction that is not so. challenge-response authentication is an authentication method to establish the identity of a user accessing the network. When a user logs on, Network Access Server (NAS), wireless access point or authentication server creates a challenge, usually a random number to the client computer. The client softwareits use a password to encrypt the challenge of an encryption algorithm or a one-way hash function and sends the results back to the network. This is the answer.

two-factor authentication requires two independent ways to establish identity and privileges. The method of having more than one factor authentication and strong authentication is required. This contrasts with traditional password authentication, for a single factor, in order to gain access to a system. Password issecret word or code that will serve as a security measure against unauthorized access to data. It is usually managed by the operating system or DBMS. However, a computer can only verify the legitimacy of the password, not the legitimacy of the user.

The two main applications of digital signatures to establish a secure connection to a website and verify the integrity of files transferred. IP spoofing refers to enter the IP address of an authorized user inTransmission of an unauthorized user illegally accessing a computer system.

Biometrics is a form of authentication than typing passwords or the use of smart cards that can be stolen. However, some possibilities, the relatively high failure rates. For example, fingerprints are captured by a scanner glass of water and foolish.

printingmachine Wireless Laser Printer

Danos tu comentario