Topic > Cybersecurity Measures: Authorization, Authentication, and Accountability

IndexAbstractIntroductionAuthenticationTypes of AuthenticationAuthorizationAccountabilityApplicationsApplication in the Internet of ThingsApplications in Cloud ComputingSummaryCybersecurity refers to the practice of protecting data from unofficial access. To resist these security challenges, several security measures are used. The field is becoming increasingly important due to the growing dependence on computer systems. Authentication, authorization and accountability play an important role in safeguarding data in online security systems and software applications. The user is identified by the authorization process. the authorization process begins after authentication. For better security purposes, authentication and authorization should be incorporated into any website, especially those that deal with online transactions and personal information. Accountability refers to the willingness to accept responsibility in data protection through various measures such as record keeping and monitoring of user activities. The regulator says financial investors and businesses are at greater risk from cybercrime data theft by cyberpunk. With the increase in technologies, cybersecurity has improved with an advantage for defenders over attackers. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an Original Essay Introduction In the coming world cybersecurity is emerging as a vast challenge for security measures. The world is moving forward with the use of new technologies, dealing with online services. So cybersecurity has emerged a big issue facing the society and its preventive measures. Cybersecurity is the act of protecting computer networks and systems from unofficial access by cyberpunks who damage software, electronic data, and also by individuals who misuse data. Due to the growing reliance on computers and smart devices, cybersecurity is increasingly targeted. The most targeted consumer devices are laptops and desktop computers from which cybercriminals collect information about financial accounts, passwords, etc. To protect your computer system, it is important to know the threats and attacks and the precautions to use. Authentication, authorization and accountability play an important role in data protection. Every single term has a specific function and purpose. AuthenticationAuthentication is the practice of identifying the identity of users. Confirm the user's identity. Authentication begins when the user enters their username, allowing the system to confirm their identity. After entering the user details, the system can confirm the identity. The authentication process compares the user's credentials with existing file details. Finally, once the identity is matched, the authentication process is complete. In short authentication works on the fact that the only user knows the password. But password authentication is not the most effective method of protecting data. Password authentication can be replaced by two other alternatives, and the alternatives are email authentication and biometric authentication. For more efficient security, companies should implement a strong authentication system to protect data from unofficial access. To prevent unauthorized people from accessing data, companies should incorporate one or more passwords togetheralternatives. So that it becomes difficult for cyberpunk to crack the password. Email authentication is a method by which the user can log in securely without using the password simply by using the email address. During email authentication, the first step is the user clicks the login button and opens an email link that directs the person to a pre-populated email message. The user sends the email using token-based security checks, the user's identity is verified. Biometricauthentication is a method by which the user can log in securely using the user's biology. The most common biometric authentication is fingerprint scanning. User identification is one of the biggest challenges in the information technology department. So, to overcome these security issues, different authentication protocols are introduced: Remote authentication dial in user service. These services are supported on a variety of platforms and devices. For centralized authentication, remote authentication in user service is a network protocol used. It is available on almost many server operating systems like Windows, Linux and many more. Kerberos. It is also a network authentication protocol. It provides strong authentication for the user and the server application through the use of a secret key called encryption. The Massachusetts Institute of Technology has introduced a free version of this protocol. Kerberos is used in commercial product services. It also provides mutual authentication. Microsoft started using Kerberos services in Windows 2000. Types of authentication The level of security also changes depending on the type of authentication. They are classified into the following types: Strong Authentication: This type of authentication is a practice that depends on two or more authentication factors. The factors used here should be mutually independent. Continuous Authentication: Many times the user is only authenticated at the initial login stage, so it can cause a security threat. Therefore, to overcome the threat, continuous user authentication methods based on some biometric traits are used. Digital Authentication: The term digital authentication refers to the electronic methods by which your identity is maintained confidentially. The American National Institute of Standards and Technology has created a generic model that includes process logging, authentication, lifecycle for better security purposes. Authorization A security that helps identify the user with respect to system sources and level of access such as files, data, services and programs. An authorization policy specifies what the user identity can do. In most cases, authorization is preceded by authentication to identify users. The authorization process verifies the user's identity and grants permission to access resources or stored data. To manage security, most multiuser operating systems depend on effective authorization policy design. The authorization is based on the authentication mechanism such as security policy, integration and Active Directory. The concept of authorization can be clarified with an example: any banking consumer can create an account and use it to access the bank's online services. In these movements authentication confirms the identity of the user with the help of authentication process and authorization helps the user to access the documents and files by granting permission to the user after.