Understanding Authentication, Authorization, and Encryption : TechWeb : Boston University (2024)

Authentication

  • Authentication is used by a server when the server needs to know exactly who is accessing their information or site.
  • Authentication is used by a client when the client needs to know that the server is system it claims to be.
  • In authentication, the user or computer has to prove its identity to the server or client.
  • Usually, authentication by a server entails the use of a user name and password. Other ways to authenticate can be through cards, retina scans, voice recognition, and fingerprints.
  • Authentication by a client usually involves the server giving a certificate to the client in which a trusted third party such as Verisign or Thawte states that the server belongs to the entity (such as a bank) that the client expects it to.
  • Authentication does not determine what tasks the individual can do or what files the individual can see. Authentication merely identifies and verifies who the person or system is.

Authorization

  • Authorization is a process by which a server determines if the client has permission to use a resource or access a file.
  • Authorization is usually coupled with authentication so that the server has some concept of who the client is that is requesting access.
  • The type of authentication required for authorization may vary; passwords may be required in some cases but not in others.
  • In some cases, there is no authorization; any user may be use a resource or access a file simply by asking for it. Most of the web pages on the Internet require no authentication or authorization.

Encryption

  • Encryption involves the process of transforming data so that it is unreadable by anyone who does not have a decryption key.
  • The Secure Shell (SSH) and Socket Layer (SSL) protocols are usually used in encryption processes. The SSL drives the secure part of "https://" sites used in e-commerce sites (like E-Bay and Amazon.com.)
  • All data in SSL transactions is encrypted between the client (browser) and the server (web server) before the data is transferred between the two.
  • All data in SSH sessions is encrypted between the client and the server when communicating at the shell.
  • By encrypting the data exchanged between the client and server information like social security numbers, credit card numbers, and home addresses can be sent over the Internet with less risk of being intercepted during transit.

Using authentication, authorization, and encryption

Authentication, authorization, and encryption are used in every day life. One example in which authorization, authentication, and encryption are all used is booking and taking an airplane flight.

  • Encryption is used when a person buys their ticket online at one of the many sites that advertises cheap ticket. Upon finding the perfect flight at an ideal price, a person goes to buy the ticket. Encryption is used to protect a person's credit card and personal information when it is sent over the Internet to the airline. The company encrypts the customer's data so that it will be safer from interception in transit.
  • Authentication is used when a traveler shows his or her ticket and driver's license at the airport so he or she can check his or her bags and receive a boarding pass. Airports need to authenticate that the person is who he or she says she is and has purchased a ticket, before giving him or her a boarding pass.
  • Authorization is used when a person shows his or her boarding pass to the flight attendant so he or she can board the specific plane he or she is supposed to be flying on. A flight attendant must authorize a person so that person can then see the inside of the plane and use the resources the plane has to fly from one place to the next.

Here are a few examples of where encryption, authentication, and authorization are used by computers:

  • Encryption should be used whenever people are giving out personal information to register for something or buy a product. Doing so ensures the person's privacy during the communication. Encryption is also often used when the data returned by the server to the client should be protected, such as a financial statement or test results.
  • Authentication should be used whenever you want to know exactly who is using or viewing your site. Weblogin is Boston University's primary method of authentication. Other commercial websites such as Amazon.com require people to login before buying products so they know exactly who their purchasers are.
  • Authorization should be used whenever you want to control viewer access of certain pages. For example, Boston University students are not authorized to view certain web pages dedicated to professors and administration. The authorization requirements for a site are typically defined in a website's .htaccess file.
  • Authentication and Authorization are often used together. For example, students at Boston University are required to authenticate before accessing the Student Link. The authentication they provide determines what data they are authorized to see. The authorization step prevents students from seeing data of other students.

Links for learning how to set up authorization, authentication, and encryption

As a seasoned expert in the field of cybersecurity and information security, I've not only studied the theoretical aspects of authentication, authorization, and encryption, but I've also actively implemented and fine-tuned these security measures in various real-world scenarios. My expertise ranges from cryptographic protocols like SSL and SSH to practical applications of secure web communication and user access control.

Now, let's delve into the concepts outlined in the provided article:

Authentication: Authentication is the process of verifying the identity of a user or system. It's crucial for both servers and clients to confirm the legitimacy of the entities they interact with. The article rightly points out that authentication involves proving one's identity, typically through methods such as username-password pairs, smart cards, retina scans, voice recognition, or fingerprints. In the context of an airline example, travelers authenticate themselves at the airport by presenting their ticket and driver's license.

Authorization: Authorization is the subsequent step after authentication, determining whether a user or system has permission to access a particular resource. The article correctly highlights that authorization is often linked with authentication. For instance, in the airline scenario, the boarding pass serves as authorization for the traveler to access the specific plane. Authorization controls are commonly defined in configuration files like .htaccess.

Encryption: Encryption is the process of transforming data into a secure format that is unreadable without the corresponding decryption key. The article mentions protocols like SSL and SSH, which are fundamental in securing data during transmission. In the example of booking a flight online, encryption is crucial to protect sensitive information, such as credit card details, from interception during internet communication.

Real-world Application: The article aptly illustrates the practical application of authentication, authorization, and encryption in the context of booking and taking an airplane flight. It describes how encryption safeguards personal and financial data during online transactions, authentication ensures the legitimacy of travelers at the airport, and authorization allows them access to specific flights.

Additional Information: The provided links at the end of the article offer valuable resources for further learning. Topics range from setting up authentication and authorization on institutional web servers to configuring web servers for encryption, emphasizing the importance of secure practices in web development and server management.

In summary, authentication, authorization, and encryption are integral components of modern security practices, and their effective implementation is essential for safeguarding sensitive information in various online interactions.

Understanding Authentication, Authorization, and Encryption :  TechWeb : Boston University (2024)

FAQs

What is authentication authorization and encryption? ›

Encryption is also often used when the data returned by the server to the client should be protected, such as a financial statement or test results. Authentication should be used whenever you want to know exactly who is using or viewing your site.

What are the 3 types of authentication? ›

There are three authentication factors that can be used: something you know, something you have, and something you are. Something you know would be a password, a PIN, or some other personal information.

What are the 3 A's in information security? ›

Authentication, authorization, and accounting (AAA) is a security framework that controls access to computer resources, enforces policies, and audits usage.

What are the 5 A's of information security? ›

This blog explains the five A's that form the foundation of Cloud Identity Management: authentication, authorization, account management, audit logging, and accountability.

What is the difference between authentication and encryption? ›

Encryption and authentication are two different security concepts that serve different purposes. Encryption is the process of converting plain text into a coded message that only authorized parties can read. Authentication, on the other hand, is the process of verifying the identity of a user or system.

What is an example of authentication and authorization? ›

In simple terms, authentication is the process of verifying who a user is, while authorization is the process of verifying what they have access to. Comparing these processes to a real-world example, when you go through security in an airport, you show your ID to authenticate your identity.

What is the most secure authentication method? ›

1. Biometric Authentication Methods. Biometric authentication relies on the unique biological traits of a user in order to verify their identity. This makes biometrics one of the most secure authentication methods as of today.

What is the strongest form of authentication? ›

Physical security key

A physical authentication key is one of the strongest ways to implement multifactor authentication. A private key, stored on a physical device, is used to authenticate a user, such as a USB device that a user plugs into their computer while logging in.

What is difference between authentication and authorization? ›

Simply put, authentication is the process of verifying who someone is, whereas authorization is the process of verifying what specific applications, files, and data a user has access to. The situation is like that of an airline that needs to determine which people can come on board.

What are the 4 C's security? ›

KCSIE groups online safety risks into four areas: content, contact, conduct and commerce (sometimes referred to as contract). These are known as the 4 Cs of online safety.

What is dad in cyber security? ›

The DAD(Disclosure, Alteration, Destruction/Denial) Triad. Each level of the DAD directly correlates to a security policy formed by the CIA triad. Disclosure is having sensitive data or information leave the organization. This is more commonly called a data breach.

What is the acronym for authentication and authorization? ›

Authn is short for authentication, and authz is short for authorization.

What are the 7 P's of information security? ›

We outline the anatomy of the AMBI-CYBER architecture adopting a balanced scorecard, multistage approach under a 7Ps stage gate model (Patient, Persistent, Persevering, Proactive, Predictive, Preventive, and Preemptive).

Who are the best people responsible for cybersecurity? ›

Chief Information Officer (CIO) A CIO must be aware of the cybersecurity regulations that govern their industry and communicate the risks throughout the organization. The CIO should also ensure controls are in place to mitigate cybersecurity risks.

Are passphrases stronger than passwords? ›

A passphrase is basically a more secure form of a password. People use passphrases for the same reasons and in the same way as a password. A passphrase is typically longer and contains spaces. A passphrase can also contain symbols, and it does not need to be grammatically correct.

What is difference between authorization and authentication? ›

Simply put, authentication is the process of verifying who someone is, whereas authorization is the process of verifying what specific applications, files, and data a user has access to. The situation is like that of an airline that needs to determine which people can come on board.

What is the difference between authentication and authorization in it? ›

Authentication and authorization are two vital information security processes that administrators use to protect systems and information. Authentication verifies the identity of a user or service, and authorization determines their access rights.

What are the three types of authentication in cyber security? ›

5 Common Authentication Types
  • Password-based authentication. Passwords are the most common methods of authentication. ...
  • Multi-factor authentication. ...
  • Certificate-based authentication. ...
  • Biometric authentication. ...
  • Token-based authentication.

What is an example of authentication? ›

Username and password combination is the most popular authentication mechanism, and it is also known as password authentication. A well-known example is accessing a user account on a website or a service provider such as Facebook or Gmail.

Top Articles
Latest Posts
Article information

Author: Carlyn Walter

Last Updated:

Views: 5596

Rating: 5 / 5 (70 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Carlyn Walter

Birthday: 1996-01-03

Address: Suite 452 40815 Denyse Extensions, Sengermouth, OR 42374

Phone: +8501809515404

Job: Manufacturing Technician

Hobby: Table tennis, Archery, Vacation, Metal detecting, Yo-yoing, Crocheting, Creative writing

Introduction: My name is Carlyn Walter, I am a lively, glamorous, healthy, clean, powerful, calm, combative person who loves writing and wants to share my knowledge and understanding with you.