Professional Documents
Culture Documents
ON
By
Submitted To
Certificate
This is to certify that Ms. Aashi Sahu(20IF056),Ms. Manisha Sarode(20IF058),
Mr. Gaurav Thakre(21IF205), Ms.Priti Rathod(20IF054),Mr. Rohan
Sambare(20IF057) of sixth Semester Diploma in IT Engineering has
satisfactorily completed the micro project entitled '' Case Study On
Authentication and Access Control (IF5469) for the academic year
2022-23 as prescribed in curriculum.
1.0Brief Introduction
3.0Action Plan (Sequence and time required for major activities for 8 weeks)
Title of Micro Project: Case study of the cyber fraud / cyber crime
1.0Brief Introduction
Access control is a method of limiting access to a system or to physical or virtual
resources. It is a process by which users can access and are granted certain
prerogative to systems, resources or information. Access control is a security
technique that has control over who can view different aspects, what can be viewed
and who can use resources in a computing environment. It is a fundamental concept
in security that reduces risk to the business or organization.
3.0 Course Outcomes Integrated (Add to the earlier list if more Cos are
addressed)
2 Microsoft Word 1
Types of Authentication
Single-Factor Authentication
The main weakness is that single-factor authentication provides just one barrier.
Hackers only need to steal the credentials to gain access to the system. And
practices such as password reuse, admin password sharing, and relying on
default or otherwise weak passwords make it that much easier for hackers to
guess or obtain them.
Two-Factor Authentication
Keep in mind that although a username and password are two pieces of
information, they are both knowledge factors, so they are considered one factor.
Certificate-Based Authentication
Access: Once authenticated and authorized, the person or computer can access
the resource.
Audit: Frequently used as part of access control to enforce the principle of least
privilege. Over time, users can end up with access they no longer need, e.g.
when they change roles. Regular audits minimize this risk.
Types of access control
There are various types of access controls that organizations
can implement to safeguard their data and users. These
include:
Conclusion :
Thus we have learnt about Authentication & Access Control and their types ,&
understood why access control is important in computer security. Access
control has streamlined countless routine processes for businesses – it has
modernized security and signaled a change in the way companies monitor their
activities.Authentication and is an important part of modern application
security. Having an effective authentication mechanism can ensure the security
of user data and prevent unauthorized access to the application.