Home » Unit 32 Networked Systems Security » Week 10 – Authentication

Week 10 – Authentication

Explain the hashing and encryption process used when authenticating username and passwords

Identify three bio-metric systems that can be used to authenticate a user on a network

Reference current trends in wearable technology that can be used to authenticate users of a workstation

Describe the importance of a hashing algorithm and the process of sharing a digital certificate over an insecure network



Users are given non-administrative accounts which follow the?



Task 1:

Provide three examples of bio-metric authentication systems and describe the techniques employed by each scanner.


Near field connection

Task 2:

Provide examples of ID card authentication and describe the advantages and disadvantages of using this method for authenticating users on a network.


Text to hex convertor
Task 3:

Research and explain the method used to store passwords on a server and authenticate a user who logs in at a remote machine.


Assignment 2