authentication and authorization

User Generated

Grnpu216

Writing

Description

How are authentication and authorization alike and how are they different? What is the relationship, if any, between the two?

3 Pages length and APA format with references....

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Kindly check the files below which contain complete work of your assignment.

Running Head: AUTHENTICATION AND AUTHORIZATION

Authentication and authorization
Name
Institutional Affiliation
Date

1

AUTHENTICATION AND AUTHORIZATION
Authentication and Authorization
Introduction
The use of information technology presents major security problems which pose many
threats to the integrity and reliability issues to the e-business and networks. Companies use
different methods to secure their information system .Internet security is critical. if you
have poor security your system will be hacked. To curb such vulnerability authentication
and authorization are important to ensure that the information system works in a protected
and secure manner. Protection information asset is essential, that is why access control is
key to security for information system various methods and tools are to protect
organization’s e-business and e-commerce.
Authentication
Authentication simply means the procedure of identifying the user. The User Name/User
ID and password. Authentication is all about validating the username credentials.
Authentication comes in two levels namely; strong and standard. Strong is for individuals
who access very highly sensitive data and information while the standard is for all other
employees.
A good example is entering a military installation where you have to provide your
identification documents. The military personnel performs authentication by checking if
the documents are valid and if they belong to you. It is actually a process of confirming if
you are who you are claiming to be. If you are authent...

Similar Content

Related Tags