You always try to be secure over the internet. That is what today's topic is related about. Well today we are going to discuss about "authentication".
To understand this let's consider a example. How do we make sure that only our house members can enter our house whenever they want to? We give ‘access to our house’ by giving house keys. This is exactly what authentication is all about.
Authentication is the process of verifying whether the person wanting to use the computer is a legal user or not. There are different types of authentication methods such as:
1. Password Protection Method- This is the most common method of authentication that has been used for years. It is still commonly used for logging into online bank accounts, email accounts as well as personal computers and laptops.
>> Authentication is done here by asking the user to ‘login’ in to the computer using a valid username and password. The password is like a secret code. You should not reveal this code to anybody. You can create more than one username and password pair to login in to the system. However, each combination or each pair is unique.
It is similar to making duplicate keys for the house! What happens if our house keys fall into the wrong hands? This can give illegal access to the person who has got the key by chance. This is the exact disadvantage of a password-protection authentication. In case any person manages to find your password, then he has equal access to your computer as you. Then the verification process fails completely.
2. Biometric Authentication Method- In today's world of computer, fingerprints or voice matching technologies are used to login. They are called biometric attributes. Since these attributes are different for a person and cannot be stolen, these methods offer additional security.
Retinal Scans and facial recognitions are also other types of biometric authentication methods.
3. Fingerprint Recognition Technology- This method verifies the fingerprint of a person and gives access only if the fingerprint matches. A digital image of the fingerprint is taken by a fingerprint sensor and stored in the system for verification.
4. Voice Recognition Technology- In this method, the user's voice is captured while recording and used to verify whenever he wants to login. Instead of typing on the computer, the user says a word or a phrase and the frequency and modulations are noted. Hence, even if another person repeats the same word or phrase, he would not get access as the voice texture may differ for him.
I hope you guys have understood about this topic and must have fun while reading. Write down your opinion in the comments section and if you found this interesting or helpful, share it with your friends who are being confused about it. Lastly, thanks for reading this article and make sure to turn on your notifications so that you get notified every time I post an awesome new content.
To understand this let's consider a example. How do we make sure that only our house members can enter our house whenever they want to? We give ‘access to our house’ by giving house keys. This is exactly what authentication is all about.
Authentication is the process of verifying whether the person wanting to use the computer is a legal user or not. There are different types of authentication methods such as:
1. Password Protection Method- This is the most common method of authentication that has been used for years. It is still commonly used for logging into online bank accounts, email accounts as well as personal computers and laptops.
>> Authentication is done here by asking the user to ‘login’ in to the computer using a valid username and password. The password is like a secret code. You should not reveal this code to anybody. You can create more than one username and password pair to login in to the system. However, each combination or each pair is unique.
2. Biometric Authentication Method- In today's world of computer, fingerprints or voice matching technologies are used to login. They are called biometric attributes. Since these attributes are different for a person and cannot be stolen, these methods offer additional security.
Retinal Scans and facial recognitions are also other types of biometric authentication methods.
3. Fingerprint Recognition Technology- This method verifies the fingerprint of a person and gives access only if the fingerprint matches. A digital image of the fingerprint is taken by a fingerprint sensor and stored in the system for verification.
4. Voice Recognition Technology- In this method, the user's voice is captured while recording and used to verify whenever he wants to login. Instead of typing on the computer, the user says a word or a phrase and the frequency and modulations are noted. Hence, even if another person repeats the same word or phrase, he would not get access as the voice texture may differ for him.
I hope you guys have understood about this topic and must have fun while reading. Write down your opinion in the comments section and if you found this interesting or helpful, share it with your friends who are being confused about it. Lastly, thanks for reading this article and make sure to turn on your notifications so that you get notified every time I post an awesome new content.
1 Comments
This seems quite important for ensuring safety in computers. I think it will help me in today's world later..Thank you very much for making everyone alert about this matter..😀👍👌
ReplyDelete