Thursday, January 13, 2011

CompTIA Security+ Exam Objectives 3.6

3.6 Authentication Models

Without proper authentication, security can go right out the window. What is the point of a security system if there is no process set to authenticate users and processes on a computer system or a server? Authentication is a must have as it is necessary in order for a person to prove their identity to a system, such as a website, a computer system, a server, and others. Authentication is a complex process but can be simple; think of just usernames and passwords, those are both ways to authenticate a user. However, more complex systems utilize certain credentials aside from a password and/or username. Authentication calls for a user to have an identity and then prove that identity is true.

Keep in mind the three parts of authentication:

1.       Something you have (ie. an access card/smart card)
2.       Something you know (password/username)
3.       Something you are (iris scan, fingerprint, etc.)

·         One, two and three-factor authentication
Multi-factor authentication requires that a user provide two or more means of authentication in order to prove their identity. The security purpose is obvious; the more ways a user can authenticate, the greater chance the user is using a true identity. When only one authentication factor is required it is known as single-factor authentication. Think of a username and password.

The next is a two-factor authentication which is sometimes known as strong authentication. When two or more factors are used there is more security because two or more attacks have to take place in order to take or steal the authentication. It can be helpful to use a password along with a biometric authentication.

·         Single sign-on – Referenced often as SSO, single sign-on is the relationship between the network and the client where the client is allowed to log-on one time and all of the resources available are based on that sign-on. This is the opposite of a user having to sign-on multiple times to multiple servers to access information or resources on them.

Today, the something you are part of authentication has become extremely popular. Consider biometrics and how this type of authentication has become widely used. Fingerprint and iris scanners have become a very common means for proving identity.
GetCertify4Less and GetCertified4Less

No comments: