Computer security and authentication means checking the individuality of a user signing onto a network. Digital certificates, passwords, smart cards and biometrics can be employed to establish the individuality of the user to the system. Computer security comprises of checking message veracity, e-mail verification and message authentication code, verifying the veracity of a broadcasted SMS(Bulk SMS). There are challenge-response authentications, human authentication, digital signature, password, biometrics and IP spoofing.
Human authentication is the confirmation that an individual started the deal, not the system. Challenge-response verification is an authentication technique employed to establish the individuality of a user signing onto the network.
2 factor authentication needs two autonomous methods to set up individuality and privileges. The technique of employing more than single-factor of authentication is also known as sturdy authentication. This distinguishes with conventional code word authentication, needing only single-factor for getting access to a structure. Code word is a clandestine word used to hand out as a safety evaluation next to unlawful access to information. It is usually handled by the OS or DBMS. Though, a system can only confirm the validity of the code word, not the validity of the user.
The two main applications of digital signatures are for fixing up a safe link to a website and confirming the truthfulness of files sent. IP spoofing is putting in the IP address of an official user into the broadcast of an unofficial user for gaining unlawful entrée to a computer.