Authentication Techniques
The techniques that are used to check a person accessing a network is who they say the are. By this I mean they are the "real deal". Examples are: -Usernames and passwords -Digital signatures -Biometrics -Magnetic stripe card/ID card -Pin numbers 1.) A username is a series of characters (letters, punctuation and numbers) that is used to identify a user to the network. It must be unique because you must not have two users with the same username. 2.)A password is a string of characters that the user will choose and when entered correctly, the user will be allowed access to the network. 3.) Four characteristics of a good password are: -Use the maximum amount of characters allowed to differentiate it from others. -Include numbers in addition to letters. -Do not use a word that can be found in a dictionary. -Include a mixture of capital and lower case letters. 4.)Things to consider when using passwords: -Do not write the password down -Change your password regularly. -Don't share your password with other people. Anti-spywareSpyware is a software that can collect and relay personal information without your knowledge. They can watch your online activities and , therefore, have the ability to intercept personal information like banking details.Anti-spyware is a software that can be installed on a network and protects computers from: -Pop-ups -Slow performance -Security threats caused by spyware and other unwanted software. |
Firewalls
A firewall is installed on a network to make sure only recognised computers to have access. It is usually a program, but is sometimes can be classed as a hardware device that filters the data coming through the internet connection. So, anyone outside the network wont have access. BiometricsBiometrics use unique features of the body that are personal to a particular user.For example: a fingerprint, the retina (eye) and a facial scan. Advantages: -You don't have to remember passwords and usernames. -It is hard to intercept, unlike swipe card systems, where cards can easily be stolen and used. Disadvantages: -Some people worry about the privacy of the data stored. For example: the pattern of their fingerprints. -Quite expensive. Digital SignaturesWhen conducting business over the internet, it is hard to decipher whether emails and other electronic documents are authentic. So, sometimes digital signatures can be used within electronic documents to prove the item is sent from the person they claim to be. |