Good morning Ma'am, am Navoneel Mondal, and my . I would like to introduce you to the concepts of Authentication and Authorization
Navoneel Mondal 21BCE1217
1. Authentication:Authentication is the process of verifying the identity of a user, device, or system attempting to access a resource. It answers the question Who are you? The goal of authentication is to prevent unauthorized access to sensitive information or resources.There are various authentication methods, including:a. Knowledge-based authentication: This involves verifying something the user knows, such as a password, personal identification number (PIN), or security questions.b. Possession-based authentication: This involves verifying something the user has, such as a smart card, security token, or one-time password (OTP) generated by a hardware or software token.c. Biometric-based authentication: This involves verifying something inherent to the user, such as fingerprints, facial recognition, iris scans, or voice recognition.d. Multi-factor authentication (MFA): This combines two or more of the above methods to provide an additional layer of security, making it more difficult for unauthorized parties to gain access.2. Authorization:Authorization is the process of determining what resources or actions a user, device, or system is permitted to access or perform once their identity has been authenticated. It answers the question What are you allowed to do?Authorization ensures that users or entities can only access or perform actions that they are authorized for based on their assigned roles, privileges, or access rights. This principle is known as least privilege, which limits the potential damage caused by unauthorized access or malicious activities.Authorization mechanisms include:a. Role-Based Access Control (RBAC): Permissions are granted based on the roles assigned to users within an organization.b. Attribute-Based Access Control (ABAC): Access is granted based on attributes associated with users, resources, and environmental conditions.c. Discretionary Access Control (DAC): Users or system administrators define and manage access rights, granting or revoking permissions to specific resources.d. Mandatory Access Control (MAC): Access is controlled by a central authority, typically based on predefined security policies and classification levels of data and users.Authentication and authorization work together to ensure that only legitimate users or entities can access resources, and even after authentication. This layered approach helps maintain the confidentiality, integrity, and availability of sensitive information and systems within an organization.