Thursday, October 15, 2009

30th Sept 2009 - Lecture 5:Authentication & Access Control;Lecture 6: Security in Network


Today, Mr. Zaki teaches new lecture that is Authentication & Access Control. What is authentication? Authentication is verification of identity of someone who generated some data. Authentication must be able to verify that message came from apparent source or author, contents have not been altered and sometimes it was sent at a certain time or sequence. Besides that, authentication also is a protection against active attack (falsification of data and transactions).

Next, Mr. Zaki explains what is Biometric? Biometrics is the measurement and statistical analysis of biological data. There are two types of biometrics methods; static and dynamic. Examples of static biometrics are fingerprint recognition, retinal scan, iris scan and hand geometry; while dynamic biometric are signature recognition, speaker recognition and keystroke dynamics.

Below figure show that the Biometric System Mode:
Then, Mr. Zaki explains what Access Control is? Access Control is the prevention of unauthorized use of a resource, including the prevention of use of a resource in an unauthorized manner.

Access Control Metric and Access Control List used to control access level pertaining to object and file. Files usually have 2 owners, user and a group. Each with its own set of permissions. Permissions are to read/write/execute in order user/group/other.
  • Read = list contents
  • Write = create or delete files in directory
  • Execute = use anything in or change working directory to this directory
After that, Mr. Zaki explains about lecture 6: Security in network. Mr. Zaki skipped the topic introduction to network because it is learn in other subject before. Mr. Zaki explain network security control.

Example of network security control are encryption, strong authentication, IPSec, VPN, SSH, Kerberos, Firewall, Intrusion Detection System (IDS), Intrusion Prevention System (IPS) or Honeypot.

Each of the network security control is important in order to secure the network for unauthorized user.

In the end of the lecture, Mr. Zaki inform us next week have mid-term exam.

No comments:

Post a Comment