Thursday, November 19, 2009

Authentication in Computer Security


The processes that are followed to verify the identity of a user who connects to a computer or network is called authentication computer security. Without spending much time describing this process, Let's Get Down right in its details.

Adware, malware, spyware and bots are just some of the threats that may be appointed, which encourage the use of a computer security system authentication. Various methods are used in the authentication process. Stress has always been, however, to a software approach to solving the authentication purposes.

Digital Certificates
The use of a certain algorithm, administrator of the computer combined with your personal user identification other companies to generate a public key. The public key certificate or digital is used for authentication in the network.

Passwords
Passwords are the process easier and more common authentication which are used not only on desktops but also at the network level. But certain rules must be followed when establishing a password for your computer or network. Do not use words easily predictable passwords, they do not even require an attacker to access the system via your account. Use passwords that are unpredictable. Set password length and use numbers and special characters in your choice of password. Remember your passwords, do not write anywhere. Hackers use various tools to know your passwords, but a long password with a number of special characters, in effect, gives a lot of trouble.

Detecting the footprint Available in almost all laptops that are manufactured today, fingerprint detection is another method of secure authentication of information security. Everyone knows that even the characteristics of the iris of two people may even match, but fingerprints can never match. Smart Cards Smart cards are among the authentication process very little material in which a single card with an integrated circuit is used to access the network. Each card is valid for a given network, when inserted in the circuit, it has been done, gives a performance that decides whether you will be allowed into the network or not. The logic programming inserted into each card is different and it is one of the most secure authentication. Systems face recognition Face recognition system, you may entertain, but people who work late in the security field have questioned its friendly character and the security it can provide. A simple calculation dimension of the face is performed by the computer and the logic used in doing so has often been considered prone to errors. Biometrics Biometrics is often regarded as a much more secure authentication of passwords or digital certificates. It is even more secure than smart cards, which may be moved. The physical and behavioral traits of an individual are taken into account in this type of authentication. Captcha Keys This authentication process is used to check whether a human or a robot computer was connected to the system. Captcha keys are randomly generated alphabets and Numericals presented in a form such that only a human can recognize. Now we will descend into the computer security processes normal authentic that we can do locally. Setting up a password of your computer's BIOS may not be the ultimate security authentication. Removing the BIOS battery from the computer system for 30 seconds, disable this security feature. Configure the administrator password is of extreme necessity. If the administrator password is not set, then any user can connect to the computer, regardless of whether he has an account in that computer or not. The methods listed above are only some of the authentication methods used. Infact, the measures we take to safeguard our computer or network is more important than the method itself. Many of us have the habit of naming our networks after the protagonist of our favorite movie. This should be avoided and networks must be sensitive names that can not be easily determined. If you are a network administrator in charge of a secure closed network, then it is always advisable to define the status of your network visibility for invisible mode.


By Richard Thomson



No comments:

Post a Comment