Wednesday, October 9, 2019
Research Paper PhD Level A Essay Example | Topics and Well Written Essays - 2500 words
Research Paper PhD Level A - Essay Example Authentication procedures in the modern day rely extensively on electronic methods. A single sign-on solution allows end-users a secured authentication for access and usage of desktops, enterprise applications, electronic communications, administrative and operational tasks (ââ¬Å"SECUDE IT Security,â⬠2008). Electronic authentication is the receiver of an electronic data message or data transaction that can assess and determine whether to accept or deny the userââ¬â¢s request. Preconfigured systems can force users to verify their authenticity prior to gaining access to the system or providing an electronic data transaction to another system. Electronic authentication assures confidence that user identities are processed safely, securely and reliably for the procedures of electronic communications to information systems (Burr, Dodson & Polk, 2006). Electronic authentication (E-authentication) presents an immense challenge in several scenarios, as the subsequent sections of this research will highlight. The process of electronic authentication is known to require several proof measures depending on the relative assurance of safety of the transaction, the reliability on the technology and the approach used, the legalities associated with the authentication parameters as well as the value of the transaction being made. Burr, Dodson & Polk (2006) best describes electronic authentication, Electronic authentication is the process of establishing confidence in user identities electronically presented to an information system. E-authentication presents a technical challenge when this process involves the remote authentication of individual people over a network, for the purpose of electronic government and commerce. Electronic authentication is still an emerging field that is witnessing the growth of newer and stronger authentication protocols aimed at outwitting the attempts of potential attackers. The increasingly remote use of authentication
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.