Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

Authentication deals with the problem of determining whether a user (or other entity) should be allowed access to a particular

system or resource.
For example, we might only allowa privileged usersuch as an administratorto install software on a system. As a result, we must somehow restrict the actions of authenticated the human, can be authenticated to a machine based on any combination of the following [14]. Something you know Something you have Something you are An ideal password is something that you know, something that a computer can verify that you know, and something nobody else can guess even with access to unlimited computing resources.

You might also like