Authentication
Authentication Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. In private and public computer networks (including the Internet), authentication is commonly done through the use of logon passwords. Knowledge of the password is assumed to guarantee that the user is authentic. Each user registers initially (or is registered by someone else), using an assigned or self-declared password. On each subsequent use, the user must know and use the previously declared password. The weakness in this system for transactions that are significant (such as the exchange of money) is that passwords can often be stolen, accidentally revealed, or forgotten.

For this reason, Internet business and many other transactions require a more stringent authentication process. The use of additional security questions and answers has become standard accross the internet. Additionaly, requests for authentication of security credentials over the internet should be done so over a secured connection (https).

Logically, authentication precedes authorization (although they may often seem to be combined).
  • Data Security

    Data Security Games, Accounting, Customer Management Systems, all of these and much more have one thing in common. The information they make available must be controlled to ensure the right information is available to the right person at the right time.

    Continue +
  • Authorization

    Authorization Once a person is authenticated the process of security is not over. Now that we have confidence of who the user is, the security system must answer the questions; What assets does the user have access to and at what permission level?

    Continue +
Vega Discoveries © 2012-2017
Site design and hosting by Vega Discoveries, LLC.

?