Page 64 - DCAP516_COMPUTER_SECURITY
P. 64

Computer Security                                            Manmohan Sharma, Lovely Professional University




                    Notes                              Unit 6: User Authentication


                                     CONTENTS
                                     Objectives
                                     Introduction

                                     6.1  User Authentication
                                     6.2  Authentication vs. Authorization
                                     6.3  Passwords as Authenticators

                                          6.3.1  Attacks on Password
                                          6.3.2  Password Selection Strategies
                                          6.3.3  Advanced Password Strategies
                                     6.4  Authentication Process
                                          6.4.1  Interactive Log on Process

                                          6.4.2  Network Authentication Process
                                     6.5  Authentication in E-commerce
                                     6.6  Economics of Strong user Authentication

                                     6.7  Future of User Authentication
                                     6.8  Biometrics
                                     6.9  Summary
                                     6.10 Keywords
                                     6.11 Review Questions

                                     6.12 Further Readings

                                   Objectives

                                   After studying this unit, you will be able to:

                                       Understand the concept of user authentication
                                       Analyze the differences between authentication and authorization
                                       Learn about the process of user authentication
                                       Comprehend the role of passwords in user authentication
                                       Discuss biometrics and its application

                                   Introduction


                                   Confidentiality, integrity, and authenticity are the most important concerns of a computer
                                   security for everyday Internet users. Although users may feel that they have nothing to hide
                                   when they are registering with an Internet site or service, privacy on the Internet is about
                                   protecting one’s personal information, even if the information does not seem sensitive. Because
                                   of the ease with which information in electronic format can be shared among companies, and



          58                                LOVELY PROFESSIONAL UNIVERSITY
   59   60   61   62   63   64   65   66   67   68   69