Access Control is the allocation of resources to users as determined by their access rights.
Access Control is the allocation of resources to users as determined by their access rights.
Active Content is content used in web pages to provide more interactivity or animated content to make web browsing more exciting. Active Content is most often embedded in a web page or could be browser plugin which executes when a user visits a page. Active Content may be streaming videos, maps, or stock tickers. It could consist of javascript or ActiveX applications or embedded objects. Without active content the Internet would be a very boring place.
Algorithm is a finite step by step procedure used to solve a mathematical problem or to perform a certain task. Algorithms are most often used by computers and may consist of a mathematical formula. Google uses an algorithm to rank websites and determine the best search listings when one types in a keyword.
Authentication or User Authentication is the process of verifying a users identity. A simple authentication, for example, can be a logging into one’s email which requires a static username and password. A stronger method of authentication is two-factor or multi-factor authentication, which may use a standard ID and password in addition to a second factor, such as a security token or biometric factor such as a fingerprint.
During multi-factor and two-factor authentication processes a device may be used for one time password generation or OTP transmission. Known as an authentication token and ranging from a proprietary device to a regular mobile phone these tokens are used for out-of-band authentication. Many times when discussing the cost of authentication security the token is mentioned due to the costs associated with hardware creation and network expenses. Downsides to tokens are that they can be misplaced, stolen or broken.
A tool used by hackers to bypass or get around a security system easier often without anyone knowing. Some viruses can create a backdoor that will allow an attacker to access and take control of your computer.
Basic Authentication is the simplest form of authentication which uses only user name and password to identify a user. This is often very insecure since usernames and passwords can be easily obtained by man-in-the-middle and other forms of cyber attacks.
Biometric authentication is when biological measurements, such as the distance between mapped out points on fingerprints or in the retina, are used as identifying factors while authenticating a user. During mutli and two-factor authentication processes biometrics could be considered the “something you are” factor. However the high cost associated with this type of authentication along with the nature of scanning makes it less desirable.