<body><script type="text/javascript"> function setAttributeOnload(object, attribute, val) { if(window.addEventListener) { window.addEventListener('load', function(){ object[attribute] = val; }, false); } else { window.attachEvent('onload', function(){ object[attribute] = val; }); } } </script> <div id="navbar-iframe-container"></div> <script type="text/javascript" src="https://apis.google.com/js/platform.js"></script> <script type="text/javascript"> gapi.load("gapi.iframes:gapi.iframes.style.bubble", function() { if (gapi.iframes && gapi.iframes.getContext) { gapi.iframes.getContext().openChild({ url: 'https://www.blogger.com/navbar/2903480847704358081?origin\x3dhttp://ismasyakict.blogspot.com', where: document.getElementById("navbar-iframe-container"), id: "navbar-iframe" }); } }); </script> <iframe src="http://www.blogger.com/navbar.g?targetBlogID=3054107564476057249&blogName=url.blogspot.com&publishMode=PUBLISH_MODE_BLOGSPOT&navbarType=BLACK&layoutType=CLASSIC&homepageUrl=http%3A%2F%2Furl.blogspot.com%2F&searchRoot=http%3A%2F%2Furl.blogspot.com%2Fsearch" height="30px" width="100%" marginwidth="0" marginheight="0" scrolling="no" id="navbar-iframe" frameborder="0"></iframe> <div id="space-for-ie"></div>
ismasyakila
A typical 16y/o girl named Isma Syakila, learning ICT in her school. Its time to recall what she had learnt. :)
Love Notes
Comments are appreciated. ^_^

The Queue
School's Official Website
Blog Panatia ICT
Teacher Hani's Blog


Musics


News
Mar 3, 2010
Identify Verification

Identity verification technique using multi-factor

By FIRKHAN HAMID ALI KHAN



TRACKING SYSTEM USING THE BEST BETWEEN biometrics to verify INDIVIDUAL IDENTITY

--------------------------------------------------------------------------------



Now, security issues over access to an information system, especially for Internet applications become a major problem in a transaction, especially in affairs related to banking.

Processes and technologies used to manage user applications and their relationship with the network and Internet applications increasingly challenging from day to day.

So, multi-factor authentication system is the best alternative for the present to address security issues arising in the Internet application.

Application authentication system is a system of proof for a consumer real self and it will ensure that only authorized access to areas only accessible by the user.

Application authentication system can function at all levels of computer network infrastructure starting from the use of computer applications fire wall, E-mail application, database, router and applications of information technology is another.

Application authentication system will provide a very important safety information that is information with respect to whom and when an application is accessed or in and out of an information system and computer network.

Application authentication system that is used often to be based on several features of self-identification or identity of a user with the method as follows: --

1. Something that user knows, such as identification number (PIN), passwords and other.

2. Something that consumers have as identity cards, driving licenses and other.

3. Something about the physical self as a user or biometric fingerprint, voice, retina and other eye.

What will happen if the authentication system applications only focus on one factor only, such as smart card or password only.

What if you lose your smart card or password was obtained through the invasion on the Internet?

So, it is something that is very weak in security verification system user. Instead, the application authentication system based on biometrics is between very good and more secure with the addition of at least two-factor authentication is another.

This is because whatever you dimilliki equipment such as smart cards and others can be stolen by anyone and so are the things that you know, it can be guessed, shared or forgotten with arbitrary.

However, it is something that is difficult for you being intruded and became the strongest factor in the authentication system.

This combination will create a system of multi-factor authentication is more secure applications for penetrated by any party.

For example, in a process of withdrawal to an account that requires an account holder uses the card with fingerprint identification and electronic signature was also required on the withdrawal form.

This is the best example of which is multi-factor authentication system is used and it can be expanded to use in system verification applications on the Internet, especially those involving financial transactions such as Internet banking.

Use authentication techniques can be implemented for any purpose that is critical in an information system.

Kritikalnya situation that it can cause great loss to the organization.

Where, invasion activity of this verification system will result in loss of data, information or any sources of the important high-value.

Data that low-risk or low value is already sufficient to verify the system is often used.

System or process or verification techniques can be implemented more efficiently with several other components such as system identification with the name or log inSystem-level control of up to a level where a user can access to the information in the computerized system and others.

Combination of the three components is also more popular known as access control involving all three components of this control should answer to four basic questions like who is that yourself?

Are you a member here? What are your rights? Are you saying that you yourself is yourself?

Questions that must be answered before one is allowed access to information or resources that are protected either through the computer, application server, router and others.

However, existing applications authentication system known as the Management Information System Identity and sold in market access which includes the three elements and equipped with multi-factor authentication technique is.

It is up to the user or company concerned whether or not to use it.

This is because there are a few things or issues that need to be taken care before the implementation of knowledge such as user applications, information technology infrastructure needs, suitability of use with applications, and other costs.

Multi-factor authentication is also known as thick or strong authentication and two factor authentication techniques are also sometimes discussed under this category.

Irrespective of whatever technology and techniques used, kebolehgunaannya by users is a major factor and very important.

In addition, it helps to create a verification system applications more secure and reliable manner.

Users can use for identity verification security especially for their applications on the Internet that involves financial transactions more secure and confident with applications such as Internet banking.

lPenulis is a lecturer Faculty of Information Technology and Multimedia, Universiti Tun Hussein Onn Malaysia (UTHM).

by ismasyakila ended @ 9:03 AM