17.2 Preventing Unauthorized Access
One of the most obvious security issues from the user’s perspective is keeping other people from accessing your accounts and information. When you log into a website, for example, providing a username and password, you are performing user authentication. That is, you are convincing the software system that you are who you say you are.
In the website example, the username and password make up the authentication credentials, the information provided by the user to identify themselves. There are three general types of authentication credentials. The first, and most common, is based on something that the user knows, such as a username and password, a personal identification number (PIN), or a combination of ...
Get Computer Science Illuminated, 7th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.