By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email
No need to pay just yet!
About this sample
About this sample
Words: 1647 |
Pages: 2|
9 min read
Published: Jun 5, 2019
Words: 1647|Pages: 2|9 min read
Published: Jun 5, 2019
Cyber security indicates towards the practice of protecting data from unofficial access. To withstand these security challenges different security measures are used. The field is becoming more important because of increased dependency on computer systems. Authentication, authorization and accountability plays an important role in safeguarding the data in online security systems and software applications. User is identified by the authorization process. authorization process begin after authentication for the better security purpose, authentication and authorization should be incorporated into any website, especially those who deal with online transaction and personal information. Accountability refers to the willingness to accept the responsibility in protecting the data through various measures such as by record keeping and tracking the user activities. The regulator state that financial investors, business are at greater risk due to cyber crime data theft by the cyberpunk. With increasing technologies the cyber security has enhanced with an advantage for defenders over attackers.
In the upcoming world cyber security is emerging as a vast challenge for security measures. The world is moving ahead with the use of new technologies, dealing with online services. So cyber security has emerged a big question in front of society and it’s preventive measures. Cyber security is the act of protecting networks and computer systems from unofficial access through cyberpunks who damages the software, electronic data and also from the individuals who misuse the data. Due to increasing dependency on computers and smart devices, the cyber security is more focused. The mostly targeted consumer devices are laptops and desktop computer from where cyber criminals gather financial account information, passwords etc. In order to protect the computer system, it's important to learn about the threats and attacks and the precautions to be used. The authentication, authorization and accountability plays an important role in securing data. Each individual term has specific function and the objective.
Authentication is the practice of identifying users identity. It confirms the users identity. Authentication starts when the user enters their username, allowing system to confirm their identity. After entering the user details the system is allowed to confirm the identity. The authentication process compares the users credentials with the details that exist already on files. At last, once the identity is matched, the authentication process is completed. In short authentication works on the fact that the only user is known to the password. But password authentication is not more effective method in securing the data. Password authentication can be replaced by two more alternatives and the alternatives are by e-mail authentication and by the biometric authentication. For more efficient security, the companies should implement a strong authentication system to keep data safe from unofficial access. To prevent data accessing from unofficial persons, companies should incorporate one or more password alternatives together. So that it becomes difficult for cyberpunk to crack the password.
Email authentication is a method by which user can securely log in without using the password just by using email address. During email authentication the first step is that the user clicks the login button and opens a mail to link that directs the person to prewritten email. The user sends the email by using token based security checks, the users identity is verified.
Biometric authentication is a method by which user can securely log in by using users biology. The most common biometric authentication is fingerprint scanning.
Users identification is one of the biggest challenge in the Information technology department. So to overcome these security issues different authentication protocols are introduced-
Depending on the type of authentication, the level of security also changes. They are categorized in following types:
A security which helps to identify user related to system sources and the access level such as files, data, services and the programs. An authorization policy specifies what the users identity is allowed to do. Most commonly authorization is predate by authentication for users identification. Authorization process verifies the user identity and grant permissions to access the resources that is the data stored. To manage security, most of the multiuser operating systems is dependent on the effective design of authorization policy. The authorization is based on authentication mechanism like security policy, integration and active directory. The concept of authorization can be clear by an example, any bank consumer can create an account and use it to log into the bank online services. At these movement authentication confirms the user identity with the help of authentication process and authorization helps the user to access the documents and files by granting permission to user after authentication.
An common authorization policy can be shared in a group of identities. Most frequently, user is aware of authorization policy when an individual uses social media like Twitter, Facebook or LinkedIn. Use of authorization process is an important part of securing data from unofficial access. It seeks the user permission about what user is able to do. Security authentication and security authorization can be an effective measure against phishing, which is an attempt to acquire sensitive information from user such as user name, password and credit card details by deceiving them. By combining one or more password together a strong password can be bring into existence.
The authentication is followed by authorization, one step is incomplete without the other. For better security purpose authentication and authorization should be incorporated into a website, especially those who deals with online transactions and personal information.
Accountability is different concept from authentication and authorization. It studies the responsibilities of an individual regarding the security measures taken. It refers to the act of accepting the duties of an individual working with information system. Each individual working with online data and applications have specific responsibilities for information assurance. The user is responsible for planning overall information protection plan. The information security should be check at proper intervals of time.
Internet of things are gaining more importance from the scientific community. So it is become of more important to enhance maintainability, usability, security and development of best practices in the field of internet of things. Research in field of internet of things is applicable at various application layer such as authentication and authorization. The problem of access control emerged, when computers began to used for data management and storage with multiple uses. Here access methods deals with authorization and not with authentication. Authorization specifies special action. In internet of things it is not limited to passwords but as well it includes security questions, their interaction history and other details. Multifactor authentication is a frequent practice done to increase the security. The first level includes identifying the user by providing little information and credentials. As application becomes more complex, the information required for user authorization grew to include roles or identity attributes.
When the customer application are organized in cloud, an authentication and authorization plug in model helps user to obtain their control on their business information. In cloud computing, the user is able to register their own authentication and authorization security module with cloud security service. Here the user should use strong passwords and authentication measures. Data is at greater risk from inside attackers than the outsiders. According to cloud computing treaty report, in cloud computing inside attacks are the sixth biggest danger in cloud computing. So to provide security they provide logical storage segregation and data isolation. The system can be strengthen against incidents by using preventive controls. For instance cloud users can use strong authentication, making it safe from unofficial access. The use of encryption technique for security purpose. Her biometric authentication can be used instead of password authentication. So that it becomes somewhere difficult for cyberpunk to access the sensitive data.
As discussed on the topic authentication, authorization and accountability. It helps to secure the data by use of different tools such as protocols to safeguard the data from unofficial access. In short, authentication sees that the person trying to access the particular application is the user or not. By using password and various authentication factors. Further based on identification, authorization helps to know about what access permissions are granted to the user. All around, the user is authenticated based on AAA server. AAA server stands for Authentication, Authorization and Accounting. Security issues arises due to failure In security measures. For securing data its necessary to withstand the all basic security measures such as authentication, authorization and accountability. accountability helps to make user aware of their responsibilities. It also introduced to the application of authentication, authorization and accountability in clod computing system and also in the internet of the things.
Browse our vast selection of original essay samples, each expertly formatted and styled