SRA 111 - Assignment 5 - ASSIGNMENT 2 What is the...

Info icon This preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
ASSIGNMENT 2 What is the difference between Identification and Authentication? Why do you believe or not information security can survive without the either one of them. What crucial elements impact your decision? - For developing security measures, Identification and Authentication are the two key concepts. Without Identification and Authentication of user, the security measures taken to secure an asset or a data is incomplete. Both Identification and Authentication go hand in hand and are mostly followed by one another. - Identification is simply a declaration of who the user is. Identification generally includes information about us. For e.g. who the user claims to be as a person, who a system claims to be over the network or who the originating party of email claims to be. The process of Identification does not involve verification or validation of the identity that the user claims. In short, it is a process of presenting an identity to a system. Identification is done in the initial stages of gaining access to the system and is what happens when a user claims to be a particular system user. - Authentication is the set of methods we use to establish a claim of identity as being true. This is a process which involves checking the identity of a user/system before the Authorization phase. Authentication process usually occurs after the Identification phase. For e.g. User entering a username or user ID to access a system is a part of Identification and proving to the system that the username belongs to user, the user enters his unique password. This comes in Authentication process. - Identification and Authentication are difficult to differentiate when they occur in one transaction. They may look same but are two different processes. The main difference between them is that Identification is related to the provisions of the identity and Authentication relates to the checks made to ensure the validity of a claimed identity. Simply, Identification involves making a claim to an identity and Authentication process involves proving that identity. - Both the process are equally important to ensure the security of an asset. Identification claims and Authentication proves. Both the process are interrelated and are incomplete without each other. Though Identification can take place without Authentication, it can cause a serious threat to a system. Any attacker with anyone’s identity can claim to be a user and can access the information. For e.g. In the case of e-mail login, the user enters a username (identification process). If he is not asked for password (authentication process), he can enter any other user’s username and can access the emails are can hack his account. - So, According to me, Information Security cannot survive only with one process. For a good secured environment, there is a need of all process interrelated and connected to one another.
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
There are numerous “factors” to consider when authenticating access to a secure information/computer system. In your opinion, which one do believe is the most valid and Why?
Image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern