Verification and conformation on someone of identity who generated some data. It involve confirming the identity of a person, tracing the origins of an artifact, ensuring that a product is what its packaging and labeling claims to be, or assuring that a computer program is a trusted one.
Requirement:
1. Message come from apparent source or author
2. Content are not be altered
3. It was sent at a certain time or sequence
Protection of passwords
1. Don’t keep your password to anybody
2. Don’t write or login your password at everywhere
Etc.
Choosing a good password
1. Criteria: -Hard to guess and easy to remember
2. Characteristics of a good password
-Not shorter than six characters
-Not patterns from the keyboard
Calculations on password
1. Password population, N =rs
2. Probability of guessing a password = 1/N
3. Probability of success, P=nt/N
Time taken by intruder to crack your password

uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology, in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. It is because each person is unique.
Biometric Identifiers
- Universality
- Uniqueness
- Stability
- Collectability
- Performance
- Acceptability
- Forge resistance
Biometric methods
- Vein recognition (hand)
- Palmprint
- Gait recognition
- Body odour measurements
- Ear shape
- DNA
- Keystroke dynamics
Static (also called physiological) biometric methods – authentication based on a feature that is always present.
Dynamic (also called behavioural) biometric methods – authentication based on a certain behaviour pattern.
Access Control : The prevention of unauthorized use of a resource, including the prevention of use of a resource in an unauthorized manner.

Access Control Element :
1.Subject - entity that can access objects
-a process representing user/application
-often have 3 classes: owner, group, world
2. Object - access controlled resource
-e.g. files, directories, records, programs etc
number/type depend on environment
3. Access right - way in which subject accesses an object
-e.g. read, write, execute, delete, create, search
This is the basic of the authentification that i can tell. For futher information about authentification you can just use http://www.google.com .
I was actually confused between both these terms. I was assuming that they holds the same meaning but after reading all the detail you have written above I got to know the exact meaning of each of them. Thank you.
ReplyDeleteelectronic signature