Lesson 2

Lesson 02 – Authentication & Authorisation

Briefly define the terms below. For each definition include an example to demonstrate your understanding:
• Authentication, Authorisation, Permission, Read/Write Access, Biometrics,
• Security Token, Multi-step Authentication.
• File Systems: FAT, FAT32, NTFS, HFS, APFS, NFS
• Encryption, Decryption, Compression, Decompression, Hashing, SSL, PGP, VPN, PKI, Public Key, Private Key, Certificate Authority.

Authentication

Authentication is a human-to-computer identification process required to ensure a user’s identity. It occurs in almost all human-to-computer interactions other than guest and automatically logged in accounts.

An example of this occurs when logging onto TAFE computers where the user is required to enter an ID and a password to gain access to their selected data and programs or similarly the same procedure occurs when wishing to purchase from online an online site.

References:

1. http://searchsecurity.techtarget.com/definition/user-authentication

2. http://hitachi-id.com/concepts/authentication.html

Authorisation

Authorization refers to both the initial establishment of a user’s access level and the subsequent checking of the assigned access level each time the user logs in to obtain access to the computer. In this manner the computer can determine what data access  permissions are available to the user during sessions and ensures that all activities are performed  by employees acting within their scope of knowledge and within an approved level of control.

Proper authorisation practices are a proactive method for preventing invalid transactions from occurring.

As an example consider bank protocols which apply authorisation protocols to ensure every staff member can only access data to the level to which they are accredited to do so by their job description.

References:

1. http://searchsecurity.techtarget.com/definition/authorization

Permission

Permissions (also known as privileges or rights ) are access details assigned by network administrators to users defining their access rights to specific network files and data.

Reference:

1. http://www.pcmag.com/encyclopedia/term/58231/user-permissions

Read/Write Access

Refers to a device that can both input and output or transmit and receive, or refers to a file that can be updated and erased. If a shared file is given read/write access, it can be changed by someone else on the network.

Reference:

1. http://www.techopedia.com/definition/12283/read-write-memory-rwm

Biometrics

Biometrics refers to technologies developed to detect and recognise unique human physical characteristics  for security purposes.  With respect to computer technology, biometrics are analogous with “biometric authentication,” used to facilitate user identification for computer login authorization.

There are several types of common examples of biometric authentication employed including facial recognition, fingerprint or retinal scanning,  voice analysis, etc.

Reference:

1. https://techterms.com/definition/biometrics

Security Token

A security token (also known as a key fob) is a physical device, such as a smart card, that together with the entry of a password permits the user authorized access to a computer system.

References:

1. https://whatis.techtarget.com/definition/token

2. http://searchsecurity.techtarget.com/definition/security-token

Multi-step Authentication

 Multi-step authentication combines two or more independent categories, such as a piece of information (password) and the measurement of a unique human parameter (biometric verification) or a physical device (key fob),  to create a layered defense against an individual’s  unauthorized access to an area, computing service or database.

Examples of multi-step authentication include logging into a website and entering an additional one-time password that the website sends to the user’s email address or phone or swiping a key card and entering a PIN into an ATM.

References:

1. http:// searchsecurity.techtarget.com/definition/multifactor-authentication-MFA

 2. https://en.wikipedia.org/wiki/Multi-factor_authentication

File Allocation Table (FAT)

FAT, first introduced in 1977 for early Microsoft operating system, is a method to better manage the positioning, storage and retrieval of hard drive data and consists of numbers corresponding to clusters (the basic units of logical storage) of specific data on a hard disk.

The FAT file system reduces the amount of searching for information and thus minimize the wear and extends the lifespan of the hard drive.

Reference:

1. http://www.computerhope.com/jargon/f/fat.htm

FAT32

Fat 32 is an enhanced File Allocation Table modified to be faster and a more flexible system for managing data on both removable and fixed media.

FAT 32 uses a more robust technology, able relocate the root directory, use a backup copy of the FAT instead of the default copy and backup critical data to be less susceptible to failure.

Reference:

1. http://www.computerhope.com/fat32.htm

New Technology File System (NTFS)

The method used by the Windows NT operating system to better manage the positioning, storage and retrieval of network data on hard drives is known as the New Technology File System (NTFS) and is the Windows NT version of the Windows 95 file allocation table (FAT).

Reference:

1. searchwindowsserver.techtarget.com/definition/NTFS

Hierarchical File System.(HFS)

The Hierarchical File System (HFS) refers to the file management method used for file organisation on a Macintosh hard disk which creates directories that expand with the addition of new files and data folders.

Reference:

1. http://www.yourdictionary.com/hierarchical-file-system#computer

APple File System (APFS)

APple File System is the newest file system launched for Apple devices. It offers several technology improvements including being optimized for flash memory, solid state drives while continuing to still support many of the offerings in Apple’s previous file system, HFS+. Other improvements include better crash protection than HFS+ using a  new “copy-on-write” meta-data feature,  one nanosecond time stamping and enhanced native encryption support.

Reference:

1. http://www.pcmag.com/encyclopedia/term/69041/apfs

Network File System (NFS)

The Network File System (NFS) is a  file system protocol, implemented in situations where central management of data is essential, that enables user storage and retrieval of data from remote locations over a shared network. 

Reference:

1. http://www.techopedia.com/definition/1845/network-file-system-nfs

Encryption

Encryption is the transformation of data into an unrecognisable cipher (sequence) used to protect sensitive information from unauthorized access. Encryption can be applied to files, storage devices and electronically transferred data.

Encrypted files are usually password protected or require a private key to be accessed.

Reference:

1. http://http://searchsecurity.techtarget.com/definition/data-encryption-decryption-IC

Decryption

Decryption is the process of transforming encrypted data back into its original form, for access by authorised personnel.

Reference:

1. http://http://searchsecurity.techtarget.com/definition/data-encryption-decryption-IC

Compression

Compression is the process by which a reduction in the total number of bits needed to represent specific data is achieved.

Compression is performed by an algorithm which shrinks the size of the data. For example, an algorithm may represent the specific data as a string of 0s and 1s, and substitute it with a smaller string of 0s and 1s by using a dictionary for the conversion between the two data forms. Alternatively, test compression can be as simple as removing all unnecessary characters.

Compressing data can decrease network bandwidth costs, improve the speed of data transfer and reduce data storage requirements .

Reference:

1. http://www.webopedia.com/TERM/D/data_compression.html

Decompression

Decompression is the process of reversing compressed data, by using appropriate software, to expand the compressed file back into its original form for user access.

Reference:

1.  http://smallbusiness.chron.com/file-compression-decompression-930.html

Hashing

Hashing is the irreversible change of a text string into a  shorter value that represents the original data via an algorithm. Hashing is used in databases to index and retrieve items as it allows faster resource access than using than the original value. It is also used  as a means of storing online personal data providing a simple, secure and efficient user authentication and authorisation method.

References:

1. http://www.webopedia.com/TERM/H/hashing.html

 2. http://searchsqlserver.techtarget.com/definition/hashing

Secure Sockets Layer (SSL)

Secure Sockets Layer (SSL) is the standard technology employed to create a encrypted link between a web server and browser for secure data transmission over a network.  

SSL is typically used when payment details for a purchase are entered into a website (i.e. the web server) and a browser to maintain the buyer’s payment details secure.

References:

1. https://www.digicert.com/ssl.htm

 2. http://searchsecurity.techtarget.com/definition/Secure-Sockets-Layer-SSL

 Pretty Good Privacy (PGP)

Pretty Good Privacy (PGP) is a software program used for encrypting and decrypting e-mail communications to ensure privacy. In principal, PGP  uses the public key encryption protocol, where senders and receivers encrypt and decrypt transmissions using their own public and private keys.

PGP is available in several versions offering different features, add-ons and variations in software methodology employed.

References:

1. http://searchsecurity.techtarget.com/definition/Pretty-Good-Privacy

 2. https://www.techopedia.com/definition/4062/pretty-good-privacy-pgp

Virtual Private Network (VPN)

A virtual private network (VPN) is an encryption technology that connects the Internet to to a private network, like an institution’s internal network. Although this is a less secure network connection, it provides some level of security when it cannot be provided by the available communication infrastructure.

A VPN is created when it is either too costly or unfeasible to access a private network such as in the case of contractors operating in remote locations and needing to access office support.

References:

1. http://searchenterprisewan.techtarget.com/definition/virtual-private-network

 2. http://www.webopedia.com/TERM/V/VPN.html

Public Key Infrastructure (PKI)

Public Key Infrastructure is a framework, based on public key encryption, for facilitating secure network data transfer, where passwords may provide inadequate user authentication or rigorous proof of identity is required and/or to validate the data being transferred. Examples where this may be used include internet activities such as banking, e-commerce and in the transmission of confidential email.

References:

1. http://www.techotopia.com/index.php/An_Overview_of_Public_Key_Infrastructures_(PKI).

2. http://www.pcmag.com/encyclopedia/term/49333/pki

Public Key

A public key is coded software created, by public key cryptography, using algorithms for the purpose of encrypting messages to enable secure network communication. Public and private keys are paired, with data decryption processed by using a different, but mathematically linked, private key. 

This type of encryption is often used by government departments to transmit sensitive data to selected receipts. For example the Health Insurance Commission uses this technology to install the protocol for pharmacies to access the Commission’s reimbursement and payment system .

References:

1. http://searchsecurity.techtarget.com/definition/public-key

 2. https://www.techopedia.com/definition/16139/public-key

Private Key

A private key is a piece of software code that is mathematically paired with a public key to  decrypt received secure data.

 References:

1. https://www.techopedia.com/definition/16135/private-key

Certificate Authority

A certificate authority (CA) is a trusted third party entity that issues digital certificates certifying the ownership of a public key by the entity named on the certificate.This allows others to rely upon assertions made about the private key that corresponds to the certified public key.

Examples of Certificate Authorities include: Symantec, DigiCert, GoDaddy, etc.

 References: