Home » Unit 32 Networked Systems Security » Week 10 – Authentication

Week 10 – Authentication

Explain the hashing and encryption process used when authenticating username and passwords

Identify three bio-metric systems that can be used to authenticate a user on a network

Reference current trends in wearable technology that can be used to authenticate users of a workstation

Describe the importance of a hashing algorithm and the process of sharing a digital certificate over an insecure network

 

Recap:

Users are given non-administrative accounts which follow the?

 

 

Task 1:

Provide three examples of bio-metric authentication systems and describe the techniques employed by each scanner.

 

Near field connection

Task 2:

Provide examples of ID card authentication and describe the advantages and disadvantages of using this method for authenticating users on a network.

 

Text to hex convertor
Task 3:

Research and explain the method used to store passwords on a server and authenticate a user who logs in at a remote machine.

 

Assignment 2