2.5 AUTHENTICATION technologies.
Authentication is a process where user verifies their identity.
Authentication deals with the problem of determining whether
a user should be allowed access to a particular system. Four
commonly authentication methods:
a. User identification (something you know - have to remember).
a. User identification (something you know - have to remember).
User identification is a unique combination of
character (letter, number or symbol) that identify specific user.
character (letter, number or symbol) that identify specific user.
Examples of user identification are pin number and password.
b. Possessed object (something you have - an object). A possessed
b. Possessed object (something you have - an object). A possessed
object is any item that you must carry to gain access to computer
or computer facility. Examples of possessed objects are ATM card,
credit card, key,security token and smart card. The card you use in
an automated teller machine (ATM) is a possessed object that allows
access to your bank account.
c. Biometric device (something you are - part of user's body) is a devices
c. Biometric device (something you are - part of user's body) is a devices
that translates personal characteristic into digital code that is
compared with the digital code stored in the database. E.g. of biometric
Tiada ulasan:
Catat Ulasan