2.3 – Authentication Techniques

2.3 – Authentication Techniques
Password – In private and public computer networks, authentication is usually done with the use of login IDs (user names) and passwords. Knowledge of the login details is pretended to make sure that the user is authentic. Each user registers at first using a given or self-declared password. On each successive use, the user must know and use the already declared password. Though, password-based authentication is not considered to be effective and strong (security wise) for any resource that contains sensitive data. The Issues With Password-Based Authentication User names are often combinations of the user’s first initial and last name,…
To access this content, you must subscribe to this Africa's Sankofa Innovation or Cybersecurity And Digital Forensics, or log in if you are a member.

Share this post