AuthenticationAttackers can attempt to gain access to sensitive data and services. Access control limits are one way to protect sensitive data. It provides limitations to who or what specific resources users can use, as well as the services or options available once access is granted. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an Original Essay The simplest and simplest form of authentication is passwords. This method is easy to implement but also the weakest and least secure. Password-only logins are very vulnerable to brute force attacks and provide no accountability. Anyone with the password can access the device and alter its configuration. There are many types of authentication methods that are better than passwords. Certificate-based authentication: -This type uses an x.509 certificate for public/private key technology. Token-based authentication: - A token, like SecurID, is a hardware device that displays an authentication code for 60 seconds; a user uses this code to log in to a network. Biometric Authentication: - This type uses a physical characteristic such as fingerprint, eye iris or handprint to authenticate the user. Authorization After users are successfully authenticated against the selected data source, they are authorized for specific data, databases, or network resources. Authorization is basically what a user can and cannot do on the network after authenticating. Authorization is typically implemented using a AAA server-based solution. Authorization uses a created set of attributes that describes the user's access to specific data or databases. These attributes are compared to the information in the AAA database, and the restriction determination for that user is made and delivered to the local router that the user is connected to. Encryption Encryption can be used to encrypt data while it is in transit or while it is stored on a hard drive. Cryptography is the study of protecting information by mathematically encrypting data, so that it cannot be deciphered without knowledge of the mathematical formula used to encrypt it. This mathematical formula is known as the encryption algorithm. Cryptography is made up of two words: crypt (meaning secret or hidden) and graphy (meaning writing). Cryptography literally means secret or hidden writing. Plaintext is plain text that can be read by everyone and the data understandable, while ciphertext is text that is encrypted as a result of the encryption process. The ciphertext must be unreadable and show no repeatable patterns to ensure data confidentiality. Please note: this is just an example. Get a custom paper from our expert writers now. Get a Custom Essay There are three critical elements to data security. Confidentiality, integrity and authentication are known as the CIA triad. Data encryption ensures confidentiality, meaning that data can only be read by authorized users. Message hashing ensures integrity by ensuring that the data sent is the same data received and that the information has not been changed in transit. Digital message signatures provide authentication (ensuring that users are who they say they are) and integrity. Message encryption and digital signatures together ensure confidentiality, authentication and integrity.
tags