Distributed Networks Distributed Networks

Network Security  «Prev  Next»
Lesson 4 What are the key authentication techniques?
Objective Identify key authentication techniques.

Key Authentication Techniques

The authentication process attempts to verify the identity of a user or system. After identification has been established, the authenticated system or user can then have access according to the parameters established by the systems administrator.

Authentication Methods

There are three methods by which users or systems can prove that they are what they claim to be. You can prove your identity by
  1. Proving what you know
  2. Showing what you have
  3. Demonstrating who you are
These three methods describe the various means of authentication as shown in the table below.
Authentication TechniquesAuthentication Techniques
Authentication methods
Authentication methods

Authentication Techniques

The most common authentication method on the Internet and in the computer world is password authentication. To create a more sophisticated authentication system, you might choose more than one authentication method. For instance, when securing a building both a card and a password might be required to enter the building. Techniques that augment authentication systems are password generators and one-time passwords (OTP). These products are aimed at preventing system snooping[1] and password hijacking. Because the passwords are used only once, a hacker who decodes any given password has no advantage.

Authentication Methods - Quiz

Click the Quiz link below to take a short multiple-choice quiz about authentication methods.
Authentication Methods - Quiz
[1] System snooping: The action of a hacker who enters a computer network and begins mapping the contents of the system.