Identification and Authentication. Identification and Authentication. When you log on to computer you enter your username and password. The first step is called identification : you announce who you are, the second step is called authentication you prove that you are who claim to be .
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
1. In UNIX, /etc/passwd is world-readable. The /etc/passwd file is a text file with one record per line, each describing a user account.
2. Shadow file /etc/shadow is a system file in which encryption user password are stored.
3. Password Salting: is a way of making password hashing more secure by adding a random string of characters to passwords before their hash is calculated, which makes them harder to reverse.
4. In Windows NT, password file is accessible, but it is written using proprietary binary format (Security by obscurity).
Best state-of-art fingerprint recognition
schemes have an EER of about 1-2%