1 / 5

Authenticity

Authenticity. By: Sambit Pulak XI-IB. Definition.

beau
Download Presentation

Authenticity

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Authenticity By: Sambit Pulak XI-IB

  2. Definition Authenticity means establishing a user’s identity beyond reasonable doubt. Authenticating the user is crucial in many scenarios, particularly in business and legal matters. A simple example of authentication is a user login to a network. A more advanced example would be the use of encrypted digital signatures in a business transaction or the use of watermarking on digital photographs.

  3. Different types • 1)Depending on the sensitivity of the resources you wish to protect will govern what level or how many layers of Authentication are/is used. • 2)Secret passwords • 3)Password policy • It is usually a confirmation to the resource provider of the authenticity of the person based on the fact the user/s know the secret password. • Used to allow access to computer systems or resources • A major weakness with passwords system can be stolen, accidentally revealed, or forgotten. This is an issue when substantial transactions occur, e.g.. money transfers. • 4)Personnel history questions: What is your mothers name? or What was your first dogs name? Are often use to verify a user particularity when passwords are forgotten or need to be changed. • 5)Software solutions IPSEC, Kerberos, XML Signature • 6)Digital signatures

  4. Use of Biometrics

  5. Bibliography http://www.ruthtrumpold.id.au/itgswiki/pmwiki.php?n=Main.Security#Authentication http://itgs.wikispaces.com/Social+%26+Ethical

More Related