LIVING IN IT-ERA GROUP 2 PRESENTORS: MARK GEREMEL P. BAUTISTA JOHN MARK N. MANIBOG
COMPUTER AUTHENTICATIONS
01 02 03 04 “ What is Authentication ” “ Why we need Authentication ” “ Advantages of Authentication ” “ Types of Authentication ” CONTENTS
5 6 “ Factors of Authentication ” “ Some examples of Authentication ” CONTENTS
Authentication USER TRUE GENUINE VALID
COMPUTER AUTHENTICATION usernames biometric data passwords AUTHENTICATION The means used to confirm the identity of a user, process, or device (e.g., user password or token). Computer authentication refers to the process of verifying the identity of a user or system attempting to access a computer or network.
Why we need Authentication? Computer networks are prone to attacks. If no authentication process, then attacker might have access to view some important information. Also verifying a user identity is often required to allow access to confidential data. 1 2 3
Advantages of Authentication It enables organizations to keep their networks secure. It protects resources like computer systems, networks, databases, websites or services. I It allows only those users who are authenticated as well as permitted to have the access on protected services. 1 2 3
TYPE OF AUTHENTICATION Multi-factor authentication Token authentication Certificate-based authentication Biometric authentication . Password authentication 1 2 3 4 5
TYPE OF AUTHENTICATION Two-factor authentication (2FA) requires users provide at least one additional authentication factor beyond a password . Two-factor/multifactor authentication 2- MORE one-time password EMAIL TEXT
TYPE OF AUTHENTICATION Biometrics uses something the user is. It relies less on an easily stolen secret to verify users own an account. Biometric identifiers are unique, making it more difficult to hack accounts using them. Biometric authentication Fingerprint scanning Palm scanning Behavioral biometrics Iris recognition Facial recognition
TYPE OF AUTHENTICATION Token-based authentication enables users to log in to accounts using a physical device, such as a smartphone, security key or smart card. It can b e used as part of MFA or to provide a passwordless experience. With token-based authentication, users verify credentials once for a predetermined time period to r educe constant logins. Token-based authentication
TYPE OF AUTHENTICATION Also known as knowledge-based authentication, password-based authentication relies on a username and password or PIN. This is the most common authentication method . Password authentication
TYPE OF AUTHENTICATION -it uses digital certificates issued by a certificate authority and public key cryptography to verify user identity. The certificate stores identification information and the public key, while the user has the private key stored virtually. Certificate-based authentication
WHO IS AN AUTHENTICATOR An authenticator is an entity which is used to confirm the identity of a user.
HOW TO CREATE AN AUTHENTICATOR SYMMETRIC ENCRYPTION ASSYMETRIC ENCRYPTION CMAC HMAC MD5 SHA-1 Encryption MAC HASH Cipher-based message authentication code (CMAC) HMAC (Hash-Based Message Authentication Codes) MD5 (Message Digest Method 5) Secure Hash Algorithm 1 (SHA-1)
HOW TO AUTHENTICATE A USER ? USER USER ID=001 PASSWORD AUTHENTICATOR
FACTORS OF AUTHENTICATION SOMETHING THE USER KNOWS SOMETHING THE USER HAS SOMETHING THE USER IS .
EXAMPLES OF AUTHENTICATION
EXAMPLES OF AUTHENTICATION USE OF A FOUR OR SIX DIGIT PASSCODE OR BIOMETRIC TO UNLOCK A PHONE
EXAMPLES OF AUTHENTICATION A SINGLE PASSWORD MAY BE BE REQUIRED TO LOG ON TO A LAPTOP OR WORK COMPUTER
EXAMPLES OF AUTHENTICATION When you go through security in an airport, you show your id to authenticate your identity.
EXAMPLES OF AUTHENTICATION When you go through security in an airport, you show your id to authenticate your identity.