0% found this document useful (0 votes)
31 views2 pages

Name: Yahye Abdillahi Matrix: 209110326

Authentication is the process of verifying a user's identity through methods like usernames and passwords, smart cards, tokens, or voice recognition. Proper authentication is important for maintaining system security, confidentiality, integrity and availability to prevent outsiders from damaging the system. An authentication system must be properly designed and implemented to help an organization achieve its goals and security objectives.

Uploaded by

Yahye Abdillahi
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views2 pages

Name: Yahye Abdillahi Matrix: 209110326

Authentication is the process of verifying a user's identity through methods like usernames and passwords, smart cards, tokens, or voice recognition. Proper authentication is important for maintaining system security, confidentiality, integrity and availability to prevent outsiders from damaging the system. An authentication system must be properly designed and implemented to help an organization achieve its goals and security objectives.

Uploaded by

Yahye Abdillahi
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Name: Yahye Abdillahi Matrix: 209110326

Authentication
Authentication is the act of verifying a person's claim on his or her identity Users are usually identified when using a system by 1. typing a username and password, 2. swiping a smart card, 3. waving a token device, 4. or using voice recognition Authentication is vital for safeguarding and maintaining the confidentiality, integrity, and availability of systems so that outsiders will not have opportunity to damage the system. A system for authenticating users must be designed and implemented properly for the organization to achieve established business goals and security control objectives.

You might also like