It describes the three steps in computer security system to granting access to network system and the network devices. The brief description is given below:
1. Authentication: it’s refers to the verification of the user, data, message, commands of the system etc. there are various types of methods used to authenticate the user. Mostly username and password are used to authenticate but sometimes multifactor authentication is provided, it involves three things:
o Something you know – password
o Something you have – token cards
o Something you are - biometrics
Radius, Kerberos and Tacacs+ are the example of authentication servers.
2. Authorization: after the authentication, the security system has to authorize the users that what kind of resources, applications, and services can use. Because hackers become successful to break the username and password but cannot access the full services without authorization. This function of the system security is handled by the ACL (Access Control List).
3. Accounting: accounting is used to keep the records of the user’s activities which have done after the authentication and authorization. It is very advance technology that is also used to verify the failure services, how much time user has been used by clients. Basically log systems are used to define the resources and services of the users and operating system.
No comments:
Post a Comment