Authentication Flashcards
Iris Recognition - Advantages
- very high accuracy
- short verification time
Iris Recognition - Disadvantages
-very expensive to install
-very intrusive
-uses alot of memory
Face Recognition - Advantages
- non intrusive
- relatively inexpensive
Face Recognition- Disadvantages
-can be affected by lighting
Voice recognition- Advantages
-non intrusive
-short verification time
- inexpensive technology
Voice recognition- Disadvantages
-a persons voice can easily recorded and used with unauthorized access
-low accuracy
-illness can cause voices to change leading to the method prevailing inefficient
Digital certificates
a pair of files on the user’s computer these files ensure security when data is being sent over the internet.
made up of six parts:
-the sender’s email address
-the name of the digital certificate owner
-a serial number
-expiry date
-public key
-digital signature of certificate authority
Secure Socket Layer
A type of protocol which ensures that data is sent and received securely over the internet.
-online banking
-online shopping
-sending and receiving emails
-instant messaging
Encryption
it is used to protect data in case it has been hacked or accessed illegally, this doesn’t prevent hacking but instead makes the data meaningless.
The Process of encryption
encryption uses a secret key, when the key is applied the text becomes unreadable. only if the recipient has the same key the encrypted message will decode.
Firewalls
can be a hardware or software, it sits between the user’s computer and the external network. It’s main function is to prevent destructive forces away from the user’s computer, it filters incoming and outgoing network traffic.
Tasks carried out by the firewall.
-filters the incoming and outgoing traffic between the user’s computer and the external network.
-checks whether network traffic meets the certain criteria.
-If criteria is not met, the firewall will block the traffic and send out an warning to the user
-criteria’s can be set so that firewalls can prevent access to undesirable sites
Two Factor Authentication
is a form of verification which needs two factor of verification to verify who the user is.
Ways passwords can be protected.
-create a strong password
-change passwords on a regular basis
-run anti spyware to ensure the password is not being relayed back to someone.