You are on page 1of 6

Identification and Authentication

Identification and Authentication

 When you log on to computer you enter your username and password. The first
step is called identification. You announce who you are, the second step is
called authentication you prove that you are who claim to be.
• Username and password

 Most computer system use identification and authentication


through usernames and passwords.

 Can be expensive to manage password securely


• Types of password attack

By taking the time to understand the different types of


password attacks and learning how to avoid them, you can
show password hackers you’re playing chess while they
fool around with checkers.
• Shoulder surfing

 Shoulder surfing is a type of security threat where an attacker


observes or captures sensitive information, such as passwords or
PINs, by watching or recording the actions of a user from close
proximity. Here’s how it works:

You might also like