
Sign up to save your podcasts
Or
Identification and authentication, or I&A is the basis for everything security. It’s the first line of defense in protecting ourselves from any kind of online threat. Not only that but it’s also a means of identifying ourselves.
Regardless of what method is being used, the purpose of I&A is to determine our identity but then granting access to systems or programs in order for us to do whatever it is we wish to do.
It also blocks unauthorized individuals or processes to enter into a network or an individual computer.
If this all sounds familiar, it should. After all, an I&A is a more technical term for passwords, passphrases, and other forms of identification. Those particular methods are the first kind of methods but there are others and each one provides deeper security.
The first method is the most common one we see: passwords, PIN numbers, or a passphrase. These are things that a user knows off hand.
The second method is something that a user has. You’ll find these in higher security areas. A common example is your debit card to access ATMs, or an ID card to enter a government building. These can also be represented by tokens.
The final method is more recent and relies on who someone is. This security method refers to something biometric like a voice pattern, an eye scan, or a fingerprint.
Each of these methods involve deeper security but remember that even the most robust security system in the world can still have flaws. While it’s important for us to consider which method is appropriate for which scenario, it’s important for us to stay vigilant and to take measures to secure ourselves.
Identification and authentication, or I&A is the basis for everything security. It’s the first line of defense in protecting ourselves from any kind of online threat. Not only that but it’s also a means of identifying ourselves.
Regardless of what method is being used, the purpose of I&A is to determine our identity but then granting access to systems or programs in order for us to do whatever it is we wish to do.
It also blocks unauthorized individuals or processes to enter into a network or an individual computer.
If this all sounds familiar, it should. After all, an I&A is a more technical term for passwords, passphrases, and other forms of identification. Those particular methods are the first kind of methods but there are others and each one provides deeper security.
The first method is the most common one we see: passwords, PIN numbers, or a passphrase. These are things that a user knows off hand.
The second method is something that a user has. You’ll find these in higher security areas. A common example is your debit card to access ATMs, or an ID card to enter a government building. These can also be represented by tokens.
The final method is more recent and relies on who someone is. This security method refers to something biometric like a voice pattern, an eye scan, or a fingerprint.
Each of these methods involve deeper security but remember that even the most robust security system in the world can still have flaws. While it’s important for us to consider which method is appropriate for which scenario, it’s important for us to stay vigilant and to take measures to secure ourselves.