SlideShare a Scribd company logo
1 of 11
Cyber Security
Chapter 2: Identification, Authentication and
Operational Security
Topics
 User name and password, Managing
passwords, choosing password
 Role of people in Security
 Access controls
 Biometrics
User name and password, Managing
passwords, choosing password
 Username : Identification (who u are ? )
 Password : Authentication (proof for identification )
 Managing Password :
1) Never reveal your passwords to others
2) Use different passwords for different accounts
3) Use long password
4) Make passwords that are hard to guess
 Choosing Password :
 Digits should be there. Eg. “john2212”.
 Use special symbols Eg. “john#2212”.
 Use lower and upper case letters Eg. “”JohN#2212”.
Role of people in Security
◦ Password Selection
◦ Piggybacking
◦ Shoulder Surfing
◦ Dumpster Diving
◦ Installing Unauthorized S/W and H/W.
◦ Access by Non employees
◦ Security Awareness
◦ Individual user responsibilities
 Password selection:-
1. Use mix of upper and lower case letters, numbers, punctuation
and special symbols
2. Don't use your login name
3. Don't use your first or last name
4. Don't use a password of all digits, or the entire same letter
 Piggybacking:-To establish a wireless Internet connection by using
another subscriber's wireless Internet access service without the
subscriber's explicit permission or knowledge.
• Shoulder Surfing:-It is a procedure where an attacker position
themselves in such a way that he is able to observe the authorized
user entering the correct access code.
• Dumpster Diving:-Dumpster diving is looking for information in
someone else's trash.
 Installing Unauthorized S/W and H/W:-when users download
various software's from Internet they are unaware about origin of
software and who upload it. Problem with such downloaded
software's is that they come with harmful codes.
• Access by Non employees :- Attacker may get physical
access to data and obtain enough information about how
to enter into computer system.
• Security Awareness :-
1. Avoid access of online banking while using unsecured
or public wifi.
2. Avoid opening email links or attachments from
strangers.
3. Use complex password that cannot be hacked easily.
• Individual user responsibilities :-
◦ Lock the door of the workspace.
◦ Do not leave sensitive information unprotected.
Access controls
 Access control:- Prevent the unauthorized use of
resources.
 Access Control Principles
 Authentication
 Authorization
 Audit
 Authentication:- Authentication determines whether the
user is permitted to access the system or not.
 Authorization:- A security administrator maintains an
authorization database that specifies which resources is
allowed for this user.
 Audit:- Auditing function monitors and keeps a record of
user accesses to system resources.
 Access Control Policies:-
 DAC
 MAC
 RBAC
BIOMETRIC
 Biometric is nothing but a authentication technology in
which human physical characteristics are used to
uniquely identify a person.
 The major biometric form factors today used are
 Hand-print
 Fingerprint
 Eye retina
 Hand-print:- Hand-print verification examine the
measurement of hand, Length of fingers, thickness of
hand, shape of curve, depth of skin and use that as a
information to allow the access.
 Fingerprint:-
 Eye retina:-

More Related Content

What's hot

Computer security and ethics
Computer security and ethicsComputer security and ethics
Computer security and ethicsSyed Zeeshan Ali
 
Virus and hacker (2)mmm
Virus and hacker (2)mmmVirus and hacker (2)mmm
Virus and hacker (2)mmmandynova
 
2016 網絡私隱通識
2016 網絡私隱通識2016 網絡私隱通識
2016 網絡私隱通識Lokman Tsui
 
2016 網絡私隱通識
2016 網絡私隱通識2016 網絡私隱通識
2016 網絡私隱通識Lokman Tsui
 
HAVEN Password Policy
HAVEN Password PolicyHAVEN Password Policy
HAVEN Password PolicyAce McGinnis
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteDOFJLCCDD
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSMd Abu Syeem Dipu
 
Web security ppt sniper corporation
Web security ppt   sniper corporationWeb security ppt   sniper corporation
Web security ppt sniper corporationsharmaakash1881
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
Protect computer from malware
Protect computer from malwareProtect computer from malware
Protect computer from malwareShouaQureshi
 
Internet Safety Techniques
Internet Safety TechniquesInternet Safety Techniques
Internet Safety TechniquesAnup Dixit
 

What's hot (20)

Computer security and ethics
Computer security and ethicsComputer security and ethics
Computer security and ethics
 
Cyber security
Cyber securityCyber security
Cyber security
 
Virus and hacker (2)mmm
Virus and hacker (2)mmmVirus and hacker (2)mmm
Virus and hacker (2)mmm
 
ISDD Security Precautions
ISDD Security PrecautionsISDD Security Precautions
ISDD Security Precautions
 
ISDD - Security Risks
ISDD - Security RisksISDD - Security Risks
ISDD - Security Risks
 
2016 網絡私隱通識
2016 網絡私隱通識2016 網絡私隱通識
2016 網絡私隱通識
 
2016 網絡私隱通識
2016 網絡私隱通識2016 網絡私隱通識
2016 網絡私隱通識
 
HAVEN Password Policy
HAVEN Password PolicyHAVEN Password Policy
HAVEN Password Policy
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
 
Web security by khubaib
Web security by khubaibWeb security by khubaib
Web security by khubaib
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Malware
MalwareMalware
Malware
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Spyware
SpywareSpyware
Spyware
 
hacking ,bluetooth
hacking ,bluetoothhacking ,bluetooth
hacking ,bluetooth
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
 
Web security ppt sniper corporation
Web security ppt   sniper corporationWeb security ppt   sniper corporation
Web security ppt sniper corporation
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Protect computer from malware
Protect computer from malwareProtect computer from malware
Protect computer from malware
 
Internet Safety Techniques
Internet Safety TechniquesInternet Safety Techniques
Internet Safety Techniques
 

Similar to Cyber security

Unit-4-User-Authentication.pptx
Unit-4-User-Authentication.pptxUnit-4-User-Authentication.pptx
Unit-4-User-Authentication.pptxPuskar Bhandari
 
User authentication
User authenticationUser authentication
User authenticationCAS
 
ISC2_Cyber_Security_Notes.pdf
ISC2_Cyber_Security_Notes.pdfISC2_Cyber_Security_Notes.pdf
ISC2_Cyber_Security_Notes.pdfCCNAAccount
 
Computer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVComputer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVEric Vanderburg
 
Mobile authentication
Mobile authenticationMobile authentication
Mobile authenticationHai Nguyen
 
2.1 Web Vulnerabilities.pptx
2.1 Web Vulnerabilities.pptx2.1 Web Vulnerabilities.pptx
2.1 Web Vulnerabilities.pptxMiteshVyas16
 
Id 00153639 md. mahbub alom_nsc_assignment_march-16
Id 00153639 md. mahbub alom_nsc_assignment_march-16Id 00153639 md. mahbub alom_nsc_assignment_march-16
Id 00153639 md. mahbub alom_nsc_assignment_march-16University of Greenwich
 
Network Security_4th Module_Dr. Shivashankar
Network Security_4th Module_Dr. ShivashankarNetwork Security_4th Module_Dr. Shivashankar
Network Security_4th Module_Dr. ShivashankarDr. Shivashankar
 
Security & control in mis
Security  & control in misSecurity  & control in mis
Security & control in misVishal Patyal
 
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...IRJET Journal
 
IM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptIM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptRAJESH S
 
Security and management
Security and managementSecurity and management
Security and managementArtiSolanki5
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theftDeepak John
 
Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & ControlAdetula Bunmi
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methodslapao2014
 

Similar to Cyber security (20)

Unit-4-User-Authentication.pptx
Unit-4-User-Authentication.pptxUnit-4-User-Authentication.pptx
Unit-4-User-Authentication.pptx
 
User authentication
User authenticationUser authentication
User authentication
 
ISC2_Cyber_Security_Notes.pdf
ISC2_Cyber_Security_Notes.pdfISC2_Cyber_Security_Notes.pdf
ISC2_Cyber_Security_Notes.pdf
 
Computer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVComputer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOV
 
3 steps security
3 steps security3 steps security
3 steps security
 
Mobile authentication
Mobile authenticationMobile authentication
Mobile authentication
 
2.1 Web Vulnerabilities.pptx
2.1 Web Vulnerabilities.pptx2.1 Web Vulnerabilities.pptx
2.1 Web Vulnerabilities.pptx
 
Network Security
Network SecurityNetwork Security
Network Security
 
Id 00153639 md. mahbub alom_nsc_assignment_march-16
Id 00153639 md. mahbub alom_nsc_assignment_march-16Id 00153639 md. mahbub alom_nsc_assignment_march-16
Id 00153639 md. mahbub alom_nsc_assignment_march-16
 
Network Security_4th Module_Dr. Shivashankar
Network Security_4th Module_Dr. ShivashankarNetwork Security_4th Module_Dr. Shivashankar
Network Security_4th Module_Dr. Shivashankar
 
Security & control in mis
Security  & control in misSecurity  & control in mis
Security & control in mis
 
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
 
IM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptIM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.ppt
 
Security and management
Security and managementSecurity and management
Security and management
 
120 i143
120 i143120 i143
120 i143
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
 
Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & Control
 
Computer security
Computer securityComputer security
Computer security
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
 

Recently uploaded

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Cyber security

  • 1. Cyber Security Chapter 2: Identification, Authentication and Operational Security
  • 2. Topics  User name and password, Managing passwords, choosing password  Role of people in Security  Access controls  Biometrics
  • 3. User name and password, Managing passwords, choosing password  Username : Identification (who u are ? )  Password : Authentication (proof for identification )  Managing Password : 1) Never reveal your passwords to others 2) Use different passwords for different accounts 3) Use long password 4) Make passwords that are hard to guess  Choosing Password :  Digits should be there. Eg. “john2212”.  Use special symbols Eg. “john#2212”.  Use lower and upper case letters Eg. “”JohN#2212”.
  • 4. Role of people in Security ◦ Password Selection ◦ Piggybacking ◦ Shoulder Surfing ◦ Dumpster Diving ◦ Installing Unauthorized S/W and H/W. ◦ Access by Non employees ◦ Security Awareness ◦ Individual user responsibilities
  • 5.  Password selection:- 1. Use mix of upper and lower case letters, numbers, punctuation and special symbols 2. Don't use your login name 3. Don't use your first or last name 4. Don't use a password of all digits, or the entire same letter  Piggybacking:-To establish a wireless Internet connection by using another subscriber's wireless Internet access service without the subscriber's explicit permission or knowledge. • Shoulder Surfing:-It is a procedure where an attacker position themselves in such a way that he is able to observe the authorized user entering the correct access code. • Dumpster Diving:-Dumpster diving is looking for information in someone else's trash.  Installing Unauthorized S/W and H/W:-when users download various software's from Internet they are unaware about origin of software and who upload it. Problem with such downloaded software's is that they come with harmful codes.
  • 6. • Access by Non employees :- Attacker may get physical access to data and obtain enough information about how to enter into computer system. • Security Awareness :- 1. Avoid access of online banking while using unsecured or public wifi. 2. Avoid opening email links or attachments from strangers. 3. Use complex password that cannot be hacked easily. • Individual user responsibilities :- ◦ Lock the door of the workspace. ◦ Do not leave sensitive information unprotected.
  • 7. Access controls  Access control:- Prevent the unauthorized use of resources.  Access Control Principles  Authentication  Authorization  Audit  Authentication:- Authentication determines whether the user is permitted to access the system or not.  Authorization:- A security administrator maintains an authorization database that specifies which resources is allowed for this user.  Audit:- Auditing function monitors and keeps a record of user accesses to system resources.
  • 8.  Access Control Policies:-  DAC  MAC  RBAC
  • 9. BIOMETRIC  Biometric is nothing but a authentication technology in which human physical characteristics are used to uniquely identify a person.
  • 10.  The major biometric form factors today used are  Hand-print  Fingerprint  Eye retina  Hand-print:- Hand-print verification examine the measurement of hand, Length of fingers, thickness of hand, shape of curve, depth of skin and use that as a information to allow the access.