The Concepts of Authentication, Authorization and Encryption: [Essay Example], 487 words GradesFixer
This essay has been submitted by a student. This is not an example of the work written by professional essay writers.

The Concepts of Authentication, Authorization and Encryption

downloadDownload printPrint

Pssst… we can write an original essay just for you.

Any subject. Any type of essay.

We’ll even meet a 3-hour deadline.

Get your price

121 writers online

Download PDF


Attackers can try to gain access to sensitive data and services. Access control limits is one of the way to secure the sensitive data. It give limitations to users who or what can use specific resources as well as the services or options available once access is granted.

Pssst... we can write an original essay just for you

Any subject. Any type of essay.

We’ll even meet a 3-hour deadline.

121 writers online

The simplest and easiest form of authentication is passwords. This method is easy to implement but also the weakest and least secure. Password-only logins are very vulnerable to brute force attacks and provides no accountability. Anyone with the password can gain entry to the device and alter the configuration.

There are many types of authentication methods which are better than passwords.

  • Certificate-Based Authentication: -This type uses an x.509 certificate for public/private key technology.
  • Token-Based Authentication: – A token, such as SecurID, is a hardware device that displays an authentication code for 60 seconds; a user uses this code to log into a network.
  • Biometric Authentication: – This type uses a physical characteristic such as fingerprint, eye iris, or handprint to authenticate the user.


After users are successfully authenticated against the selected data source, they are than authorized for specific data or database or network resources. Authorization is basically what a user can and cannot do on the network after that user is authenticated.

Need help with writing?

You can order professional work according to specific instructions and 100% plagiarism free.

Authorization is typically implemented using a AAA server-based solution. Authorization uses a created set of attributes that describes the user’s access to the specific data or database. These attributes are compared to information contained within the AAA database, and determination of restrictions for that user is made and delivered to the local router where the user is connected.


Encryption can be used to encrypt data while it is in transit or while it’s stored on a hard drive. Cryptography is the study of protecting information by mathematically scrambling the data, so it cannot be deciphered without knowledge of the mathematical formula used to encrypt it. This mathematical formula is known as the encryption algorithm. Cryptography is composed of two words: crypt (meaning secret or hidden) and graphy (meaning writing). Cryptography literally means secret or hidden writing. Cleartext is the plan text which can be read by everyone and understandable data, and cipher text is the scrambled text as a result of the encryption process. Cipher text should be unreadable and show no repeatable pattern to ensure the confidentiality of the data.

There are three critical elements to data security. Confidentiality, integrity, and authentication are known as the CIA triad. Data encryption provides confidentiality, meaning the data can only be read by authorized users. Message hashing provides integrity, which ensures the data sent is the same data received and the information was not modified in transit. Message digital signatures provide authentication (ensuring users are who they say they are) as well as integrity. Message encrypting, and digital signatures together provide confidentiality, authentication, and integrity.

infoRemember: This is just a sample from a fellow student.

Your time is important. Let us write you an essay from scratch

100% plagiarism-free

Sources and citations are provided

Find Free Essays

We provide you with original essay samples, perfect formatting and styling

Cite this Essay

To export a reference to this article please select a referencing style below:

The Concepts of Authentication, Authorization and Encryption. (2018, November 19). GradesFixer. Retrieved April 19, 2021, from
“The Concepts of Authentication, Authorization and Encryption.” GradesFixer, 19 Nov. 2018,
The Concepts of Authentication, Authorization and Encryption. [online]. Available at: <> [Accessed 19 Apr. 2021].
The Concepts of Authentication, Authorization and Encryption [Internet]. GradesFixer. 2018 Nov 19 [cited 2021 Apr 19]. Available from:
copy to clipboard

Sorry, copying is not allowed on our website. If you’d like this or any other sample, we’ll happily email it to you.

    By clicking “Send”, you agree to our Terms of service and Privacy statement. We will occasionally send you account related emails.


    Attention! this essay is not unique. You can get 100% plagiarism FREE essay in 30sec

    Recieve 100% plagiarism-Free paper just for 4.99$ on email
    get unique paper
    *Public papers are open and may contain not unique content
    download public sample

    Sorry, we cannot unicalize this essay. You can order Unique paper and our professionals Rewrite it for you



    Your essay sample has been sent.

    Want us to write one just for you? We can custom edit this essay into an original, 100% plagiarism free essay.

    thanks-icon Order now

    Hi there!

    Are you interested in getting a customized paper?

    Check it out!
    Having trouble finding the perfect essay? We’ve got you covered. Hire a writer uses cookies. By continuing we’ll assume you board with our cookie policy.


    Haven't found the right essay?

    Get an expert to write you the one you need!


    Professional writers and researchers


    Sources and citation are provided


    3 hour delivery