Professional Documents
Culture Documents
Network Security
Network Security
Firewalls
Authentication techniques
These are used to check that a person accessing a network or a
system is genuinely the person in question.
Examples are:
Username and password (you must have both)
Digital signatures
Biometrics (using your finger print)
Magnetic stripe card/ID card
PIN numbers
1. What is a username and why must it be unique?
An identification used by a person with access to a computer,
network, or online service.
2. What is a password?
A secret word or phrase that must be used to gain admission to a place or
a string of characters that allows access to a computer, interface, or
system.