Today,
information technology is developing rapidly, which allows everyone to
communicate from one place to another at a distance of thousands of kilometres.
The Data that is sent to it using the telecommunications transmission lines
that are not necessarily assured keamananya. When data are being sent through
the transmission medium is stolen or altered by the tappers and cracker for
particular interests. This is an issue for the telecommunication world
especially in the delivery of critical data requiring high intelligence such as
information confidentiality kemeliteran, finance bank, the country's
confidential information and other important information.
With regard
to the control of a variety of safeguards built in hardware and operating
systems that are reliable and not corrupted to preserve the integrity of
program and data.
To address
the problem of it's used to protect authentication data and information on the
computer system, in order not to be used or modified people who aren't in the
authorization. that information in a computer system can only be accessed by
authorised parties and modification while maintaining the consistency and
integrity of data in the system.
Authentification
is the process in order to validate the user when entering the system, the name
and password of the user in check through a process check directly to the list
of those who were given the right to enter the system. This authorization is
set up by your administrator, webmaster or site owner (holder of the highest
rights or those designated in the system. For this process, each user will be
on the check of the data they provide such as name, password, and other things
not covered may be like hours of use, an allowed location.
Besides the
authentification is also one of the many methods used to provide evidence that
a particular document is received electronically actually came from the person
concerned and does not turn the trick is to send a particular code via e-mail
and then the owner of the email mereplay mail or entering a code that has been
sent.
Authentication
server serves to recognize the user that integrates into the network and
contains all the information from the user, in practice usually
authentification server has backupp that serves to keep if there are server
problems so that networks and uninterrupted service.
In a Web
application required a mechanism that can protect data from users who do not
have access to it, for example, a Web site that contains photos of the family
and is only accessible by members of the family. This mechanism can be
implemented in the form of a login process which usually consists of three
phases, namely: identification, authentication and authorization
Authentication
process in principle serve as a user and a service provider's opportunity in
the process of access to the resource. The user must be able to provide the
needed information for the service provider is entitled to resourcenya. Being
the giver of the service must be able to ensure that the parties are not
entitled to will not be able to access this resource.
No comments:
Post a Comment