Information and Communication Security

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Reflection Journal

Individual Assessment

This week lecture gives detailed discussion of user authentication, a crucial idea in computer
security, was given in this lecture. User authentication is crucial because it builds user
responsibility and access control by establishing trust in user identities. Authentication Methods
examined a range of authentication techniques, including biometric, token, and password-
based systems (Lal, 2016). Different degrees of ease and security are provided by each
approach. Although hash functions and strong password standards are essential to
safeguarding passwords from dictionary and brute-force assaults, password security is still
extensively utilised.

Physical tokens, such as smart cards, store user credentials and may need further
authentication elements, such as PINs. When it comes to security, they are superior than
passwords alone. A biometric approach uses a person's distinct physical traits, such as their
fingerprints or iris scans, to identify them (Lepilin, 2020). Although they provide great security,
biometrics can be costly to install. Multiple-Factor Verification Enhancing the security posture
considerably is possible by combining two or more authentication factors. The user may be
required to provide a password, token, or biometric as part of MFA.

Remote user to prevent replay and eavesdropping attacks, additional security procedures are
needed when authenticating users across networks. Challenge-response protocols offer an
accurate response through the generation of unique challenges for every authentication request.
The lecture highlighted the most prevalent security threats, like replay attacks, eavesdropping,
and denial-of-service attacks, which impact systems of user authentication.
I learn about the Adequate countermeasures, like encryption, challenges of response protocols, &
password constraints of stringent. In this lecture real life examples have seen use to show
efficiently the concepts being discussed. For instance, the importance for confidentiality &
integrity during circumstances needing remote user authentication was highlighted during
studying ATM security.

After studying this whole lecture now, I have a good understanding of user authentication
concepts & know the value of secured access of digital systems. In future I am very excited to
learn more about security.
Reference
Lepilin, A. V., Shkarin, V. V., Al-Harazi, G., Dmitrienko, S. V., Domenyuk, D. A., Potrysova, A., &
Domenyuk, S. (2020). A biometric approach to diagnosis and management of morphological
changes in the dental structure. Archiv EuroMedica, 10(3), 118-126.

Lal, N. A., Prasad, S., & Farik, M. (2016). A review of authentication methods. Int. J. Sci. Technol.
Res, 5(11), 246-249.

You might also like