0% found this document useful (0 votes)
433 views10 pages

Information Security 18 - Identification and Authentication of Local and Distributed Systems

These are notes made by me

Uploaded by

maryamtoheed4
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
433 views10 pages

Information Security 18 - Identification and Authentication of Local and Distributed Systems

These are notes made by me

Uploaded by

maryamtoheed4
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

CSI-604 - Information Security

ArfanShahzad.com
Course Outline

ArfanShahzad.com
Identification and Authentication of
Local and Distributed Systems
• “Identification and authentication” are two distinct but closely related
concepts in the context of both local (single-system) and distributed
(networked) systems.

• They play a crucial role in ensuring the security and access control of
users and entities within these systems.

• Major differences are discussed:

ArfanShahzad.com
Identification and Authentication of
Local and Distributed Systems cont…
• Identification: Identification is the process by which a user or entity
claims an identity, such as a username or account number, within a
system.

• Identification alone does not verify the authenticity of the user's


claim; it merely establishes the claimed identity within the system.

ArfanShahzad.com
Identification and Authentication of
Local and Distributed Systems cont…
• Local Systems: In a local system (e.g., a single-user computer or a
stand-alone application), identification might involve the user
entering a username or selecting a profile.

• The system then associates the chosen identifier with the


corresponding user account or profile.

ArfanShahzad.com
Identification and Authentication of
Local and Distributed Systems cont…
• Distributed Systems: In a distributed system (e.g., a networked
application or a multi-user server), identification usually occurs when
a user provides a username or other identifying information during
the login process.

• The distributed system then associates this identifier with the user's
account or role within the network.

ArfanShahzad.com
Identification and Authentication of
Local and Distributed Systems cont…
• Authentication: Authentication, on the other hand, is the process of
verifying whether the claimed identity is valid and belongs to the
entity making the claim.

• Authentication ensures that the user is who they say they are and
that they have the necessary credentials to access the system or
resources within it.

ArfanShahzad.com
Identification and Authentication of
Local and Distributed Systems cont…
• Local Systems: In local systems, authentication may involve entering a
password, PIN, fingerprint, or other credentials to prove that the
person interacting with the system is the authorized user of that
account or device.

• The system checks the provided credentials against stored records to


grant or deny access.

ArfanShahzad.com
Identification and Authentication of
Local and Distributed Systems cont…
• Distributed Systems: In distributed systems, authentication often
includes providing a password, passphrase, or other authentication
factor.

• Additionally, more advanced authentication methods like multi-factor


authentication (MFA) might be used in distributed systems to
enhance security.

ArfanShahzad.com
Identification and Authentication of
Local and Distributed Systems cont…
• Authentication mechanisms in distributed systems involve
communication between the user's device and a remote
authentication server to verify credentials.

ArfanShahzad.com

You might also like