What Is The Purpose Of The Network Security Authentication Function?
Share
Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.
Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
Network security authentication is a function that helps to verify the identity of a user or device attempting to gain access to a network system. It serves as a way to prevent unauthorized users from accessing information or resources on the network. Authentication may be achieved through a variety of methods such as username and password, biometric scans, one-time passwords, and certificates.
What is the purpose of the network security authentication function?
Answer: some terms like authentication, authorization, and accounting are the services in the network known as the AAA. authentication needs to find the user identification while authorization determines the resource of the access and accounting keep an eye on user actions.
What is authentication?
The authentication is to determine who are the user, the identity of the user. The term user authentication is also common which means checking the user identity when the user login to the particular app, system website, etc.
The main purpose is to prevent unknown or unauthorized users to get access to the system. the OS (operating system) has 3 ways to determine the user identity which are: Password, physical identification, and biometric. These are explained in the following section:
Password:
A password is an ancient and common method to check user identification. A password is the digits is a text which is specifically allocated to the user who has the access to the system. The user has their password and the username which is only known by him.
When the user logs in with the user name and password the system checks its data either the given login detail is correct or not and gives the response according to it. if the detailed match with the system the user is allowed and vice versa.
Physical identification:
In this method, a machine determines the user identification with some specific symbols, cards, or badges. The companies have the physical identification method by allocating the employees an identity card that has the information stored. when the employee shows the card, he/she will be allowed to enter the companies otherwise the alarm went off.
Sometimes along with the card, the password is also needed to enter such as the ATM. Nowadays the smart card has been invented which contain all the information along with password but it has a drawback when it gets lost.
Biometric:
The biometric is further advanced than physical identification.it involves biological characteristics such as voice, fingerprints, face, eyes, etc., the devices are a scanner that collects the unique data of the user. Software that transforms the data to form which is stored. A database that has the information of different users.
The function of the authentication:
The function of the authentication is given in the following section:
Message authentication:
The function has two levels which are:
Lower level: generate a value to authenticate the message.
higher value: give the signals that the message has been received.
The function has three groups:
Message encryption: encrypt the message to the cipher form.
Message authentication code: the secret key with a fixed length that acts as an authenticator.
Hash function: it maps the message regard of the length to hash value for authentication.