M2 - Suggest how users can be authenticated to gain access to a networked system

Different Types of Access Security

Identification - This is when somebody says who they are.

Authentication - This is when somebody proves they are who they say they are, this is usually through some form of ID, i.e. Passport or Driving License.  


Authorisation - This is when somebody gives you permission to do something.


Two Factor Standard Of Authentication
Two factor standard of authentication is when two different types of proof is necessary. For example when withdrawing money from an ATM you would need a valid debit card and the corresponding PIN number. Two factor standard of authentication is better and far more secure than one factor standard authentication because it requires the attacker to gain two different types of authentication which is much harder than finding out just one. 

Username/Password
This method requires the user to provide a valid username and corresponding password, if either of these is incorrect they will be denied access. This is a good method of authentication because it requires two pieces of confidential information, which can both be updated and changed regularly to keep the account secure. An advantage of using this method of authentication is that there is nothing physical that an attacker can steal, such as an ID card or key. However, a disadvantage of this method is if an attacker got hold of your password (either through a keylogger or by looking over your shoulder, for example.) it would be very easy to gain access to your account.

Biometrics Authentication
Biometrics is a very unique method of authentication, this is because it can either make decisions based on the users behaviour or their physical attributes. I.e fingerprints, Retina Scan, Palm scan. These are all things an attacker can not physically steal or easily forge, which is what makes this method so secure. The disadvantages of this method are that it is very expensive to set up and maintain and it can also be more time consuming than simply entering a password.


Digital Certificate
A digital certificate is an attachment put on an electronic message as a method of authenticating the person sending the message. The certificate must be obtained through a recognized certificate authority. It basically means when someone is sending personal information it is encrypted, this is important for information such as credit card numbers etc when making online purchases. The information is then decrypted once it has been sent via the digital certificate. The main advantage of this being when a user is entering confidential information they know they can trust the website. One of the disadvantages is that it can be expensive to maintain.




Popular posts from this blog

D1 - Discuss Recent Network Threats

P3 - Explain what an organisation can do to minimise security breaches in networked systems

M3 - Report on the similarities and differences between securing wireless and wired networked systems.