Chapter 2
Chapter 2
Chapter 2
Authentication
Authentication
• The property of accurate identification is called
authentication;
The first critical tool for security professionals is
authentication and its techniques and technologies,
Computers have replaced many face-to-face interactions with
electronic ones,
With no vigilant neighbor to recognize that something is
awry,
people need other mechanisms to separate authorized from
unauthorized parties.
• The basis of computer security is controlled access:
someone is authorized to take some action on something,
In security, the subject can be;
people, computer processes (executing programs), network
connections, devices, and similar active entities.
Authentication
• Computers depend on data to recognize
others;
• In computer systems, determining who a
person really is consists of two separate steps:
Identification:
− is the act of asserting who a person is.
like names, are often well:
known, public, and
not protected.
Authentication:
− is the act of proving that asserted identity: that the
person is who she says she is.
Like password, card, fingerprint, that are:
private and
necessarily protected.
Authentication;
Identification Versus Authentication
• Identification:
asserting who a person is,
Identities are often well known, predictable, guessable or
easily determined as;
− your name, Your bank account number,
− debit card number, email address, and
− other things are ways by which people and processes identify you.
it does not provide the real protection.
Not protected.
• Authentication should be;
proving that asserted identity.
Reliable and private,
Protected, and
Authentication mechanisms use any of three qualities to
confirm a user’s identity:
Authentication;
Identification Versus Authentication
− Something the user knows;
Passwords, PIN numbers, passphrases, a secret handshake, and
mother’s maiden name.
− Something the user has;
Identity badges, physical keys, a driver’s license, or a uniform are
common examples of things people have that make them
recognizable.
− Something the user is;
These authenticators, called biometrics, are based on a physical
characteristic of the user, such as;
− a fingerprint, retina and iris of the eye, blood vessels in the finger or
hand, a face (picture) or facial features.
− These authentication methods are just starting to be used in
computer authentications.
− Something the user does;
include recognition by voice pattern, handwriting characteristics,
typing rhythm, and Signatures.
Two or more forms can be combined;
− for ex; a bank card and a PIN combine;
Something the user has (the card) with something the user
knows (the PIN).
Authentication;
Authentication Based on Phrases and Facts: Something You Know