NIS 2.1 Identification & Authentication
NIS 2.1 Identification & Authentication
• In secure system people might want to track the identities of the users
requesting its services.
• Authentication is the process of verifying a user's identity. There exist two
reasons for authenticating a user.
• First, the user identity is a parameter in access control decisions.
• Second, the user identity is recorded when logging security relevant events
in an audit trail.
Identification & Authentication:
• When the user logged on to a computer, he performs two tasks: -
1)Identification: Enter User Name & Password
2)Authentication: Prove that you are authorized user
• After entering username & password, the computer will compare this input
against the entries stored in password file. Login is successful if username &
password is valid & if wrong then login is fail.
• Many systems count the fail login attempts & prevent or deny next attempt
when threshold has been reached.Now a days, many computer system use
identification & authentication through username & password as first step of
protection. This mechanism is widely accepted because it is not very difficult to
implement.
• But managing password security can be quite expensive & obtaining a valid
password is a common way of gaining unauthorized access to computer system.
• There are three main security processes working together to provide
access to assets in a controlled manner.
• These processes are:
• If the attacker is lucky, the target has poor security process they may
succeed in finding user ID's and passwords. If the password is
changed and old password is discarded, lucky dumpster driver may
get valuable clue.
• It can use access codes, sticky notes phone list, calendar, and
organization chart to assist attacker to gain access to the network.