Topic > Identification and Authentication Examples - 810

Identification and Authentication: ID and validation are the most essential aspects of security. Without both of these elements, your structure is helpless. The organization must somehow know who is in the picture and what they are doing. If you don't have the ability to know, how can you tell if someone who isn't supposed to be looking at an index isn't taking a look at the document? The answer is that you don't have a clue. Whenever an individual, system, or alternative PC needs to contact a data system with the end goal of including data, retrieving data, or performing some function, the reached data system must first distinguish the individual or protest that it is reaching . There are two main reasons for doing this, the first is that the data framework achieved can group any entry or transaction with the character of the requesting individual or framework. Systems and requests generally have transaction logs or audit logs that describe events that have occurred, and those logs almost reliably collaborate with the people who performed the task and the other is that the data system achieved can confirm that the requested movement is permitted As stated by Morrison (2007), you may have the ability to distinguish a person incorrectly, but when verification is included, distinguishing qualifications will work. Identification could be done in a couple of ways. A path is via a username and password. This is done by the individual entering the correct data to gain access. The data user must not record the password or username so that others cannot find out if they tell someone else with...... half of the document ...... information link that must be selected before user is allowed to access the site.U3: User checks their site email for the email sent by the system and gets the confirmation link. The user selects this confirmation link. S3: The system accepts the confirmation link and prompts the user to log in using their email and password. Post condition: The user is a member of the website. Profile Management of an account, including contact information:Description: A registered user modifies his profile data. References Morrison, R. (2007, Autumn). Comment: Multi-factor identification and authentication [Electronic version]. Management Information Systems, 24(4), 331-332.Hirayama, T., Iwai, Y., & Yachida, M. (2007, May). Integrating face pose estimation and person identification for face authentication [Electronic version]. Systems and computers in Japan, 38(5), 43-58.