Here is the synopsis of our sample research paper on Authentication. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
This 7 page paper examines various types of web based authentication practices. Several products are examined and the use of authentication with firewalls is discussed. Bibliography lists 6 sources.
Page Count:
7 pages (~225 words per page)
File: RT13_SA036web.rtf
Buy This Term Paper »
 
Unformatted sample text from the term paper:
more digit password. This is known as authentication. The person at the keyboard is identified as the rightful user of the service. Authentication is a term that reflects methods used
to determine the identity of a person or user (Miller PG). Many people come into contact with various types of authentication systems when ordering products online or merely singing
on to an Internet service providers site. In order to send and collect electronic mail, for example, a user must have a way to communicate his or her identity. The
authentication process keeps the user safe from unscrupulous individuals who would read their email, or steal their identity for a time, and it also allows business to be done effectively.
Unlike brick and mortar businesses, where clerks can check identification, computers are not at the stage where there is eye contact between participants. Rather, people type in credit card and
other sensitive information, information that is often protected by encryption so that others cannot read the data is being transmitted. With the use of such methods, information is scrambled and
for the most part, the user is safe. But authentication is easier utilized than implemented. Authentication is something that involves the inclusion of various applications as well as continued maintenance.
Authentication is an extremely important concept in security as many critical security services are dependent on the ability to make sure users are who they say they are
(Miller PG). What is the function of web based authentication? The authentication mechanism allows the generation of reliable audit trails so that users may be identified (PG). Also, it
is something required for non-repudiation in communications and finally, the authentication process is important in preserving confidentiality (PG). Methods used to facilitate authentication may be broken down
...