Thursday, October 29, 2009

Authentification and Access Control

Authentification
Verification and conformation on someone of identity who generated some data. It involve confirming the identity of a person, tracing the origins of an artifact, ensuring that a product is what its packaging and labeling claims to be, or assuring that a computer program is a trusted one.

Requirement:
1. Message come from apparent source or author
2. Content are not be altered
3. It was sent at a certain time or sequence

Protection of passwords
1. Don’t keep your password to anybody
2. Don’t write or login your password at everywhere
Etc.

Choosing a good password
1. Criteria: -Hard to guess and easy to remember
2. Characteristics of a good password
-Not shorter than six characters
-Not patterns from the keyboard

Calculations on password
1. Password population, N =rs
2. Probability of guessing a password = 1/N
3. Probability of success, P=nt/N

Time taken by intruder to crack your password
Biometric

uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology, in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. It is because each person is unique.

Biometric Identifiers

  • Universality
  • Uniqueness
  • Stability
  • Collectability
  • Performance
  • Acceptability
  • Forge resistance

Biometric methods

  • Vein recognition (hand)
  • Palmprint
  • Gait recognition
  • Body odour measurements
  • Ear shape
  • DNA
  • Keystroke dynamics
Static and Dynamic Biometric method
Static (also called physiological) biometric methods – authentication based on a feature that is always present.

Dynamic (also called behavioural) biometric methods – authentication based on a certain behaviour pattern.

Access Control : The prevention of unauthorized use of a resource, including the prevention of use of a resource in an unauthorized manner.


Access Control Element :
1.Subject - entity that can access objects
-a process representing user/application
-often have 3 classes: owner, group, world
2. Object - access controlled resource
-e.g. files, directories, records, programs etc
number/type depend on environment
3. Access right - way in which subject accesses an object
-e.g. read, write, execute, delete, create, search

This is the basic of the authentification that i can tell. For futher information about authentification you can just use http://www.google.com .

1 comment:

  1. I was actually confused between both these terms. I was assuming that they holds the same meaning but after reading all the detail you have written above I got to know the exact meaning of each of them. Thank you.
    electronic signature

    ReplyDelete