close
test_template

The Concepts of Authentication, Authorization and Encryption

About this sample

About this sample

close

Words: 487 |

Page: 1|

3 min read

Published: Nov 19, 2018

Words: 487|Page: 1|3 min read

Published: Nov 19, 2018

Authentication

Attackers can try to gain access to sensitive data and services. Access control limits is one of the way to secure the sensitive data. It give limitations to users who or what can use specific resources as well as the services or options available once access is granted.

'Why Violent Video Games Shouldn't Be Banned'?

The simplest and easiest form of authentication is passwords. This method is easy to implement but also the weakest and least secure. Password-only logins are very vulnerable to brute force attacks and provides no accountability. Anyone with the password can gain entry to the device and alter the configuration.

There are many types of authentication methods which are better than passwords.

  • Certificate-Based Authentication: -This type uses an x.509 certificate for public/private key technology.
  • Token-Based Authentication: - A token, such as SecurID, is a hardware device that displays an authentication code for 60 seconds; a user uses this code to log into a network.
  • Biometric Authentication: - This type uses a physical characteristic such as fingerprint, eye iris, or handprint to authenticate the user.

Authorization

After users are successfully authenticated against the selected data source, they are than authorized for specific data or database or network resources. Authorization is basically what a user can and cannot do on the network after that user is authenticated.

Authorization is typically implemented using a AAA server-based solution. Authorization uses a created set of attributes that describes the user’s access to the specific data or database. These attributes are compared to information contained within the AAA database, and determination of restrictions for that user is made and delivered to the local router where the user is connected.

Encryption

Encryption can be used to encrypt data while it is in transit or while it’s stored on a hard drive. Cryptography is the study of protecting information by mathematically scrambling the data, so it cannot be deciphered without knowledge of the mathematical formula used to encrypt it. This mathematical formula is known as the encryption algorithm. Cryptography is composed of two words: crypt (meaning secret or hidden) and graphy (meaning writing). Cryptography literally means secret or hidden writing. Cleartext is the plan text which can be read by everyone and understandable data, and cipher text is the scrambled text as a result of the encryption process. Cipher text should be unreadable and show no repeatable pattern to ensure the confidentiality of the data.

Get a custom paper now from our expert writers.

There are three critical elements to data security. Confidentiality, integrity, and authentication are known as the CIA triad. Data encryption provides confidentiality, meaning the data can only be read by authorized users. Message hashing provides integrity, which ensures the data sent is the same data received and the information was not modified in transit. Message digital signatures provide authentication (ensuring users are who they say they are) as well as integrity. Message encrypting, and digital signatures together provide confidentiality, authentication, and integrity.

Image of Alex Wood
This essay was reviewed by
Alex Wood

Cite this Essay

The Concepts of Authentication, Authorization and Encryption. (2018, November 19). GradesFixer. Retrieved April 25, 2024, from https://gradesfixer.com/free-essay-examples/the-concepts-of-authentication-authorization-and-encryption/
“The Concepts of Authentication, Authorization and Encryption.” GradesFixer, 19 Nov. 2018, gradesfixer.com/free-essay-examples/the-concepts-of-authentication-authorization-and-encryption/
The Concepts of Authentication, Authorization and Encryption. [online]. Available at: <https://gradesfixer.com/free-essay-examples/the-concepts-of-authentication-authorization-and-encryption/> [Accessed 25 Apr. 2024].
The Concepts of Authentication, Authorization and Encryption [Internet]. GradesFixer. 2018 Nov 19 [cited 2024 Apr 25]. Available from: https://gradesfixer.com/free-essay-examples/the-concepts-of-authentication-authorization-and-encryption/
copy
Keep in mind: This sample was shared by another student.
  • 450+ experts on 30 subjects ready to help
  • Custom essay delivered in as few as 3 hours
Write my essay

Still can’t find what you need?

Browse our vast selection of original essay samples, each expertly formatted and styled

close

Where do you want us to send this sample?

    By clicking “Continue”, you agree to our terms of service and privacy policy.

    close

    Be careful. This essay is not unique

    This essay was donated by a student and is likely to have been used and submitted before

    Download this Sample

    Free samples may contain mistakes and not unique parts

    close

    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

    close

    Thanks!

    Please check your inbox.

    We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!

    clock-banner-side

    Get Your
    Personalized Essay in 3 Hours or Less!

    exit-popup-close
    We can help you get a better grade and deliver your task on time!
    • Instructions Followed To The Letter
    • Deadlines Met At Every Stage
    • Unique And Plagiarism Free
    Order your paper now