Page 64 - DCAP516_COMPUTER_SECURITY
P. 64
Computer Security Manmohan Sharma, Lovely Professional University
Notes Unit 6: User Authentication
CONTENTS
Objectives
Introduction
6.1 User Authentication
6.2 Authentication vs. Authorization
6.3 Passwords as Authenticators
6.3.1 Attacks on Password
6.3.2 Password Selection Strategies
6.3.3 Advanced Password Strategies
6.4 Authentication Process
6.4.1 Interactive Log on Process
6.4.2 Network Authentication Process
6.5 Authentication in E-commerce
6.6 Economics of Strong user Authentication
6.7 Future of User Authentication
6.8 Biometrics
6.9 Summary
6.10 Keywords
6.11 Review Questions
6.12 Further Readings
Objectives
After studying this unit, you will be able to:
Understand the concept of user authentication
Analyze the differences between authentication and authorization
Learn about the process of user authentication
Comprehend the role of passwords in user authentication
Discuss biometrics and its application
Introduction
Confidentiality, integrity, and authenticity are the most important concerns of a computer
security for everyday Internet users. Although users may feel that they have nothing to hide
when they are registering with an Internet site or service, privacy on the Internet is about
protecting one’s personal information, even if the information does not seem sensitive. Because
of the ease with which information in electronic format can be shared among companies, and
58 LOVELY PROFESSIONAL UNIVERSITY