September 16, 2011

Computer Security Authentication

Possible computer security authentication means verifying the identity of a user accessing a network. Passwords, digital certificates, smart cards and biometrics to prove the identity of the user network. Authentication security involves verifying the integrity of messages, e-mail authentication and MAC (Message Authentication Code), verifying the integrity of the message transmitted. There are human challenge-response authenticationAuthentication, password, digital signature, IP spoofing and biometrics.

Human authentication is to verify if a business person, do not start the computer. Authentication is a challenge-response authentication method to prove the identity of a register of users on the network. When a user logs on, the server (NAS Network Access) wireless access point or authentication server a challenge to the rule, a random number inClient machine. The client software uses the password to the challenge of an encryption algorithm or a one-way hash function encrypts and sends the result back to the network. This is the answer.

Wireless Network Card Desktop

wireless network card desktop

Two-factor authentication requires two independent ways to establish identity and privileges. The method of using more than one factor of authentication is also called strong authentication. This contrasts with traditional password authentication, and requires only one factorTo access a system. Password is a secret word or code used to serve as a measure of security against unauthorized access to data. And 'typically managed by the operating system or DBMS. However, a computer can only check the legitimacy of the password is not the legality of the users.

The two main applications for digital signatures to establish a secure connection to a website and verify the integrity of files transferred. IP spoofing refers to the inclusion of the IP addressan authorized user in the transmission of an unauthorized user to gain unauthorized access to a computer system.

Biometrics is a form of password authentication type or even the use of smart card that can be stolen. However, some possibilities, the relatively high failure rates. For example, fingerprints are captured by a scanner and a glass of water silly.

Computer Security Authentication

wireless network card desktop

Bedbug Dust