Q.14 Explain various methods for authentication.

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question
Q. 14 Explain various methods for authentication.
Transcribed Image Text:Q. 14 Explain various methods for authentication.
Expert Solution
Explaination

There are various method of the authentication . 

Password based authentication : 

We all know that the password based authentication is the best type of authentication and is the most popular and widely used. Such type of authentication is mostly followed by the web applications, desktop applications . 

In the password based authentication it consist of the usernames and the password combinations. The usernames can be email also . The password based authentication is strong but sometimes the human behaviour of maintaining the old and easy makes it very prone to attacks . 

The bruteforce is a technique of assuming the password based on various combinations . hence all such mechanism had lead this authentication system to weaken against the attackers . 

 

 Multi factor authentication : 

Such type of authentication adds the extra layer of security to the primary authentication mechanism . Such type of authentication is always used along with some primary authentication technique .

Now days almost all the web applications have the multi factor authentications. After logging in as the user the user have to complete some more steps to prove their authenticity .If we consider the password authentication as primary then we always have the One time password verification in conjunction with it . OTP is the one time code sent to the registered mobile number of the user to make sure the actual user is trying to login to the account . 

There are also captcha and some other types of authentications are available that make sure that the humans are trying to login into the account and not any anonymous bot .

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Encryption and Decryption
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education