SlideShare a Scribd company logo
Describe the authentication process in the figure below:
Solution
Authentication begins when a user tries to access information. First, the user must prove his
access rights and identity. When logging into a computer, users commonly enter usernames and
passwords for authentication purposes. This login combination, which must be assigned to each
user, authenticates access. However, this type of authentication can be circumvented by hackers.
A better form of authentication, biometrics, depends on the user’s presence and biological
makeup (i.e., retina or fingerprints). This technology makes it more difficult for hackers to break
into computer systems.
The Public Key Infrastructure (PKI) authentication method uses digital certificates to prove a
user’s identity. There are other authentication tools, too, such as key cards and USB tokens. One
of the greatest authentication threats occurs with email, where authenticity is often difficult to
verify. For example, unsecured emails often appear legitimate.

More Related Content

Similar to Describe the authentication process in the figure below Solutio.pdf

put the following into another words Authentication is the process of.docx
put the following into another words Authentication is the process of.docxput the following into another words Authentication is the process of.docx
put the following into another words Authentication is the process of.docx
LukeQVdGrantg
 
Identity cues two factor data sheet
Identity cues two factor data sheetIdentity cues two factor data sheet
Identity cues two factor data sheetHai Nguyen
 
Three Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern SecurityThree Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern Security
ijtsrd
 
What is Authentication vs Authorization Difference? | INTROSERV
What is Authentication vs Authorization Difference? | INTROSERVWhat is Authentication vs Authorization Difference? | INTROSERV
What is Authentication vs Authorization Difference? | INTROSERV
SaqifKhan3
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
Vuda Sreenivasarao
 
Iaetsd fpga implementation of rf technology and biometric authentication
Iaetsd fpga implementation of rf technology and biometric authenticationIaetsd fpga implementation of rf technology and biometric authentication
Iaetsd fpga implementation of rf technology and biometric authentication
Iaetsd Iaetsd
 
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONAN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
IJCNCJournal
 
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONAN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
IJCNCJournal
 
A Simplified Guide to the Evolution of Authentication!
A Simplified Guide to the Evolution of Authentication!A Simplified Guide to the Evolution of Authentication!
A Simplified Guide to the Evolution of Authentication!
Caroline Johnson
 
The Role of Digital Certificates in Contemporary Government Systems: the Case...
The Role of Digital Certificates in Contemporary Government Systems: the Case...The Role of Digital Certificates in Contemporary Government Systems: the Case...
The Role of Digital Certificates in Contemporary Government Systems: the Case...
Arab Federation for Digital Economy
 
Everything you need to Know about PKI .pdf
Everything you need to Know about PKI .pdfEverything you need to Know about PKI .pdf
Everything you need to Know about PKI .pdf
Anvesh Vision Private Limited
 
A novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and securityA novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and security
ijsptm
 
Three types of Authentications
Three types of AuthenticationsThree types of Authentications
Three types of Authentications
deorwine infotech
 
Iaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured email
Iaetsd Iaetsd
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryptionmonroel
 
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATIONCASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
Pankaj Rane
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_faHai Nguyen
 
Evolution of MFA.pptx
Evolution of MFA.pptxEvolution of MFA.pptx
Evolution of MFA.pptx
IsraaAkramBasheer
 

Similar to Describe the authentication process in the figure below Solutio.pdf (20)

put the following into another words Authentication is the process of.docx
put the following into another words Authentication is the process of.docxput the following into another words Authentication is the process of.docx
put the following into another words Authentication is the process of.docx
 
Identity cues two factor data sheet
Identity cues two factor data sheetIdentity cues two factor data sheet
Identity cues two factor data sheet
 
Three Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern SecurityThree Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern Security
 
What is Authentication vs Authorization Difference? | INTROSERV
What is Authentication vs Authorization Difference? | INTROSERVWhat is Authentication vs Authorization Difference? | INTROSERV
What is Authentication vs Authorization Difference? | INTROSERV
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Iaetsd fpga implementation of rf technology and biometric authentication
Iaetsd fpga implementation of rf technology and biometric authenticationIaetsd fpga implementation of rf technology and biometric authentication
Iaetsd fpga implementation of rf technology and biometric authentication
 
Biometrics
BiometricsBiometrics
Biometrics
 
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONAN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
 
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONAN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
 
A Simplified Guide to the Evolution of Authentication!
A Simplified Guide to the Evolution of Authentication!A Simplified Guide to the Evolution of Authentication!
A Simplified Guide to the Evolution of Authentication!
 
The Role of Digital Certificates in Contemporary Government Systems: the Case...
The Role of Digital Certificates in Contemporary Government Systems: the Case...The Role of Digital Certificates in Contemporary Government Systems: the Case...
The Role of Digital Certificates in Contemporary Government Systems: the Case...
 
Everything you need to Know about PKI .pdf
Everything you need to Know about PKI .pdfEverything you need to Know about PKI .pdf
Everything you need to Know about PKI .pdf
 
A novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and securityA novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and security
 
Three types of Authentications
Three types of AuthenticationsThree types of Authentications
Three types of Authentications
 
Iaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured email
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
 
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATIONCASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
 
120 i143
120 i143120 i143
120 i143
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
 
Evolution of MFA.pptx
Evolution of MFA.pptxEvolution of MFA.pptx
Evolution of MFA.pptx
 

More from arpitaeron555

match the following attributes to the parts of a compilerstrips ou.pdf
match the following attributes to the parts of a compilerstrips ou.pdfmatch the following attributes to the parts of a compilerstrips ou.pdf
match the following attributes to the parts of a compilerstrips ou.pdf
arpitaeron555
 
Multiple-Choice Which one is a discrete variableRadius of a ball.pdf
Multiple-Choice Which one is a discrete variableRadius of a ball.pdfMultiple-Choice Which one is a discrete variableRadius of a ball.pdf
Multiple-Choice Which one is a discrete variableRadius of a ball.pdf
arpitaeron555
 
Looking for some help with this assignment. 1. Define distribut.pdf
Looking for some help with this assignment. 1. Define distribut.pdfLooking for some help with this assignment. 1. Define distribut.pdf
Looking for some help with this assignment. 1. Define distribut.pdf
arpitaeron555
 
Introduction and BackgroundIn recent lectures we discussed usi.pdf
Introduction and BackgroundIn recent lectures we discussed usi.pdfIntroduction and BackgroundIn recent lectures we discussed usi.pdf
Introduction and BackgroundIn recent lectures we discussed usi.pdf
arpitaeron555
 
In the binary search, if the array being searched has 32 elements in.pdf
In the binary search, if the array being searched has 32 elements in.pdfIn the binary search, if the array being searched has 32 elements in.pdf
In the binary search, if the array being searched has 32 elements in.pdf
arpitaeron555
 
Is there any information out there about decorator crabs picking up .pdf
Is there any information out there about decorator crabs picking up .pdfIs there any information out there about decorator crabs picking up .pdf
Is there any information out there about decorator crabs picking up .pdf
arpitaeron555
 
Heliconius melpomene is a species of butterfly with ZW sex determina.pdf
Heliconius melpomene is a species of butterfly with ZW sex determina.pdfHeliconius melpomene is a species of butterfly with ZW sex determina.pdf
Heliconius melpomene is a species of butterfly with ZW sex determina.pdf
arpitaeron555
 
Identify the key mechanism that determines which X remains active an.pdf
Identify the key mechanism that determines which X remains active an.pdfIdentify the key mechanism that determines which X remains active an.pdf
Identify the key mechanism that determines which X remains active an.pdf
arpitaeron555
 
For each of the given functions, list the domain and range. Also list.pdf
For each of the given functions, list the domain and range. Also list.pdfFor each of the given functions, list the domain and range. Also list.pdf
For each of the given functions, list the domain and range. Also list.pdf
arpitaeron555
 
Given to girls born in the U.S. in the years The tables below give t.pdf
Given to girls born in the U.S. in the years  The tables below give t.pdfGiven to girls born in the U.S. in the years  The tables below give t.pdf
Given to girls born in the U.S. in the years The tables below give t.pdf
arpitaeron555
 
How do open source projects work How is it different from closed sou.pdf
How do open source projects work How is it different from closed sou.pdfHow do open source projects work How is it different from closed sou.pdf
How do open source projects work How is it different from closed sou.pdf
arpitaeron555
 
Ferdinand is affected by hemophilia, a recessive x-linked condition..pdf
Ferdinand is affected by hemophilia, a recessive x-linked condition..pdfFerdinand is affected by hemophilia, a recessive x-linked condition..pdf
Ferdinand is affected by hemophilia, a recessive x-linked condition..pdf
arpitaeron555
 
Explain whether you think IFRS and GAAP will be fully converged. Wha.pdf
Explain whether you think IFRS and GAAP will be fully converged. Wha.pdfExplain whether you think IFRS and GAAP will be fully converged. Wha.pdf
Explain whether you think IFRS and GAAP will be fully converged. Wha.pdf
arpitaeron555
 
Does the following picture depict a function It so, is it a one to o.pdf
Does the following picture depict a function It so, is it a one to o.pdfDoes the following picture depict a function It so, is it a one to o.pdf
Does the following picture depict a function It so, is it a one to o.pdf
arpitaeron555
 
Do patients have health care rights that are not legal or statuatory.pdf
Do patients have health care rights that are not legal or statuatory.pdfDo patients have health care rights that are not legal or statuatory.pdf
Do patients have health care rights that are not legal or statuatory.pdf
arpitaeron555
 
Discuss the history of bureaucratic and administrative management..pdf
Discuss the history of bureaucratic and administrative management..pdfDiscuss the history of bureaucratic and administrative management..pdf
Discuss the history of bureaucratic and administrative management..pdf
arpitaeron555
 
Describe or explain how SNPs in genes at evolutionary conserved brea.pdf
Describe or explain how SNPs in genes at evolutionary conserved brea.pdfDescribe or explain how SNPs in genes at evolutionary conserved brea.pdf
Describe or explain how SNPs in genes at evolutionary conserved brea.pdf
arpitaeron555
 
Data x word 23 y word -3 Write assembly code for the following p.pdf
Data  x word 23  y word -3  Write assembly code for the following p.pdfData  x word 23  y word -3  Write assembly code for the following p.pdf
Data x word 23 y word -3 Write assembly code for the following p.pdf
arpitaeron555
 
Can Variance Inflation factors be used to detect Heteroscedasticity .pdf
Can Variance Inflation factors be used to detect Heteroscedasticity .pdfCan Variance Inflation factors be used to detect Heteroscedasticity .pdf
Can Variance Inflation factors be used to detect Heteroscedasticity .pdf
arpitaeron555
 
A study undertaken by the Miami-Dade Supervisor of Elections in 2002.pdf
A study undertaken by the Miami-Dade Supervisor of Elections in 2002.pdfA study undertaken by the Miami-Dade Supervisor of Elections in 2002.pdf
A study undertaken by the Miami-Dade Supervisor of Elections in 2002.pdf
arpitaeron555
 

More from arpitaeron555 (20)

match the following attributes to the parts of a compilerstrips ou.pdf
match the following attributes to the parts of a compilerstrips ou.pdfmatch the following attributes to the parts of a compilerstrips ou.pdf
match the following attributes to the parts of a compilerstrips ou.pdf
 
Multiple-Choice Which one is a discrete variableRadius of a ball.pdf
Multiple-Choice Which one is a discrete variableRadius of a ball.pdfMultiple-Choice Which one is a discrete variableRadius of a ball.pdf
Multiple-Choice Which one is a discrete variableRadius of a ball.pdf
 
Looking for some help with this assignment. 1. Define distribut.pdf
Looking for some help with this assignment. 1. Define distribut.pdfLooking for some help with this assignment. 1. Define distribut.pdf
Looking for some help with this assignment. 1. Define distribut.pdf
 
Introduction and BackgroundIn recent lectures we discussed usi.pdf
Introduction and BackgroundIn recent lectures we discussed usi.pdfIntroduction and BackgroundIn recent lectures we discussed usi.pdf
Introduction and BackgroundIn recent lectures we discussed usi.pdf
 
In the binary search, if the array being searched has 32 elements in.pdf
In the binary search, if the array being searched has 32 elements in.pdfIn the binary search, if the array being searched has 32 elements in.pdf
In the binary search, if the array being searched has 32 elements in.pdf
 
Is there any information out there about decorator crabs picking up .pdf
Is there any information out there about decorator crabs picking up .pdfIs there any information out there about decorator crabs picking up .pdf
Is there any information out there about decorator crabs picking up .pdf
 
Heliconius melpomene is a species of butterfly with ZW sex determina.pdf
Heliconius melpomene is a species of butterfly with ZW sex determina.pdfHeliconius melpomene is a species of butterfly with ZW sex determina.pdf
Heliconius melpomene is a species of butterfly with ZW sex determina.pdf
 
Identify the key mechanism that determines which X remains active an.pdf
Identify the key mechanism that determines which X remains active an.pdfIdentify the key mechanism that determines which X remains active an.pdf
Identify the key mechanism that determines which X remains active an.pdf
 
For each of the given functions, list the domain and range. Also list.pdf
For each of the given functions, list the domain and range. Also list.pdfFor each of the given functions, list the domain and range. Also list.pdf
For each of the given functions, list the domain and range. Also list.pdf
 
Given to girls born in the U.S. in the years The tables below give t.pdf
Given to girls born in the U.S. in the years  The tables below give t.pdfGiven to girls born in the U.S. in the years  The tables below give t.pdf
Given to girls born in the U.S. in the years The tables below give t.pdf
 
How do open source projects work How is it different from closed sou.pdf
How do open source projects work How is it different from closed sou.pdfHow do open source projects work How is it different from closed sou.pdf
How do open source projects work How is it different from closed sou.pdf
 
Ferdinand is affected by hemophilia, a recessive x-linked condition..pdf
Ferdinand is affected by hemophilia, a recessive x-linked condition..pdfFerdinand is affected by hemophilia, a recessive x-linked condition..pdf
Ferdinand is affected by hemophilia, a recessive x-linked condition..pdf
 
Explain whether you think IFRS and GAAP will be fully converged. Wha.pdf
Explain whether you think IFRS and GAAP will be fully converged. Wha.pdfExplain whether you think IFRS and GAAP will be fully converged. Wha.pdf
Explain whether you think IFRS and GAAP will be fully converged. Wha.pdf
 
Does the following picture depict a function It so, is it a one to o.pdf
Does the following picture depict a function It so, is it a one to o.pdfDoes the following picture depict a function It so, is it a one to o.pdf
Does the following picture depict a function It so, is it a one to o.pdf
 
Do patients have health care rights that are not legal or statuatory.pdf
Do patients have health care rights that are not legal or statuatory.pdfDo patients have health care rights that are not legal or statuatory.pdf
Do patients have health care rights that are not legal or statuatory.pdf
 
Discuss the history of bureaucratic and administrative management..pdf
Discuss the history of bureaucratic and administrative management..pdfDiscuss the history of bureaucratic and administrative management..pdf
Discuss the history of bureaucratic and administrative management..pdf
 
Describe or explain how SNPs in genes at evolutionary conserved brea.pdf
Describe or explain how SNPs in genes at evolutionary conserved brea.pdfDescribe or explain how SNPs in genes at evolutionary conserved brea.pdf
Describe or explain how SNPs in genes at evolutionary conserved brea.pdf
 
Data x word 23 y word -3 Write assembly code for the following p.pdf
Data  x word 23  y word -3  Write assembly code for the following p.pdfData  x word 23  y word -3  Write assembly code for the following p.pdf
Data x word 23 y word -3 Write assembly code for the following p.pdf
 
Can Variance Inflation factors be used to detect Heteroscedasticity .pdf
Can Variance Inflation factors be used to detect Heteroscedasticity .pdfCan Variance Inflation factors be used to detect Heteroscedasticity .pdf
Can Variance Inflation factors be used to detect Heteroscedasticity .pdf
 
A study undertaken by the Miami-Dade Supervisor of Elections in 2002.pdf
A study undertaken by the Miami-Dade Supervisor of Elections in 2002.pdfA study undertaken by the Miami-Dade Supervisor of Elections in 2002.pdf
A study undertaken by the Miami-Dade Supervisor of Elections in 2002.pdf
 

Recently uploaded

Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 

Recently uploaded (20)

Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 

Describe the authentication process in the figure below Solutio.pdf

  • 1. Describe the authentication process in the figure below: Solution Authentication begins when a user tries to access information. First, the user must prove his access rights and identity. When logging into a computer, users commonly enter usernames and passwords for authentication purposes. This login combination, which must be assigned to each user, authenticates access. However, this type of authentication can be circumvented by hackers. A better form of authentication, biometrics, depends on the user’s presence and biological makeup (i.e., retina or fingerprints). This technology makes it more difficult for hackers to break into computer systems. The Public Key Infrastructure (PKI) authentication method uses digital certificates to prove a user’s identity. There are other authentication tools, too, such as key cards and USB tokens. One of the greatest authentication threats occurs with email, where authenticity is often difficult to verify. For example, unsecured emails often appear legitimate.