Knowing The Difference & Implications Between Authentication, Authorization & Encryption

With the existence of too many malware and even ransomware nowadays, you can never be too careful or too lax in handling or managing your accounts, especially when it comes to network or computer security. So that we can have a better grasp of the value or difference of having our accounts or content protected, let’s define and look at each of the words that encompass & gives meaning to security & protection. 

Before proceeding to the detailed descriptions of each term that offers safety for us, we must first need to know that there are two main objectives in having a truly secured computer or network environment, and they are as follows: (1) Preventing or keeping out unauthorized persons from gaining access to our resources, and (2) Making sure that only authorized persons can access the resources they need. 

There are basically various components involved in being able to achieve these goals. Assigning access permissions to resources is one that specifies which users may or may not have to access those resources and under what circumstances - for instance, you may want a specific user or group to have access when logged on from a computer that is physically on-site but not from a remote dial-up connection. Yet, it may only work if you can verify the identity of the user who is attempting to access the resources. So, this is where authentication comes in. 

We will look at the role played by authentication, authorization, & encryption in a network security plan through this article - and determine the difference of each essential component to help us achieve the security we need.

 

AUTHENTICATION

A crucial element of a typical security model, it is the process of confirming the identification of a user or a machine <in some cases> who’s trying to log on or access resources. Various authentication mechanisms exist today, but they all serve the same purpose. 

  • It is used by a server when it needs to know exactly who is trying to get their information or login to the site.
  • It may also be used by a client in knowing if the server is a system that it claims to be.
  • Authentication works in both ways, the user or computer has to prove its identity to the server or client.
  • Authentication by a server usually entails utilization of a username & password. Other means to authenticate can be through cards, retina scans, voice recognition, and fingerprints.
  • On the other hand, authentication by a client involves the server giving a certificate to the client in which a trusted third party such as Verisign or Thawte states that the server belongs to a bank(a sample entity) that the client expects it to.
  • It cannot determine what tasks the individual can do or what files the individual can see. Authentication merely identifies and verifies who the person or system is. 

AUTHORIZATION

After verifying the user’s identity (authentication), authorization then verifies that the user in question has the correct permissions & rights to access the requested resource. As you have probably realized by now, these two work together - authentication happens first then authorization. 

  • This is a process in which the server determines if the client has permission to use a resource or access any file.
  • Authorization works hand-in-hand with authentication so that the server has some concept of who the client is that is requesting for access.
  • Authentication types needed for authorization may vary - passwords may be required in some cases but not in others.
  • Authentication by a server usually entails utilization of a username & password. Other means to authenticate can be through cards, retina scans, voice recognition, and fingerprints.
  • There are exceptional cases that have no authorization - any user may utilize a resource or gain access to a file simply by asking for it. Most web pages on the Internet require no authentication or authorization.

ENCRYPTION

This involves the process of transforming data so that it is unreadable by anyone who does not have the decryption key. 

  • The Secure Shell (SSH) and Socket Layer (SSL) protocols are typically used in encryption processes. The SSL drives the secure part of “https://” sites used on e-commerce sites such as e-Bay and Amazon.com.
  • All information in SSL transactions is encrypted between the client (browser) & the server (web server) before the data is transferred between the two.
  • Every data in SSH sessions is encrypted between the client & the server when communicating at the shell.
  • By encrypting the information exchanged between the client and the server, data such social security numbers, credit card numbers, & home addresses can be sent over the Internet with less risk of being intercepted during transit.

 

On a daily basis, we use authentication, authorization & encryption most of the time. A good example for this is - booking and taking an airplane flight.

  • Encryption is used when a person buys their ticket online at one of the many sites that advertise affordable tickets. Upon finding the perfect flight at an ideal price, a person goes to buy the ticket. Encryption is used to protect a person’s credit card and personal information when it is sent over the Internet to the airline. The company encrypts the customer’s data so that it will be safer from an interception in transit.
  • Authentication works when the traveler shows his or her ticket & driver’s license at the airport so he/she can check in his/her bags and receive a boarding pass. Airports need to authenticate that the person is the right one and has purchased a ticket before giving the boarding pass.
  • Authorization happens when a person shows the boarding pass to the flight attendant so he/she can board the plane where he’s supposed to be flying on. The flight attendant must authorize a person so that person can get inside the plane & use the resources to fly from one place to the other.

Here are a few examples of where encryption, authentication, and authorization are used by computers 

  • Encryption is used whenever people are giving out personal data to register for something or buy a product. This ensures the person’s privacy during the transaction. Encryption is likewise used when the data returned by the server to the client should be protected, such as a financial statement or test results.
  •  Authentication is applicable whenever you want to know exactly who is using or viewing your site. Web login is Boston University’s primary method of authentication. While other commercial websites such as Amazon.com require people to log in before buying products so they know exactly who their buyers are.
  • Authorization is used whenever you want to control viewer access of certain pages. Ex., Boston University students are not authorized to view certain web pages for professors and administration. The authorization requirements for a site are typically defined in a website’s .htaccess file.
  • Authentication & Authorization are often used together. Like having the students at Boston University to authenticate before accessing the Student Link. It then determines what data they are authorized to see. The authorization step prevents students from seeing data of other students. 

To learn more about the three elements of computer security & protection, visit our site at foneapi.com or leave your comments below & we’ll get back to you for further details.

Comments
AUTHOR
1 june 2017

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

0
Reply
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form
Reach us through these channels?
voice
video
messaging
email
social
CLOSE WIDGET
Voice Channel
Click To Call
Get A CallBack
Show Number To Call
CLOSE WIDGET
Click to Call
000
1
.
2
ABC
3
DEF
4
GHI
5
JKL
6
MNO
7
PQRS
8
TUVW
9
XYZ
*
.
0
+
#
.
Audio
Audio
Mute
Mute
Dialer
Dialer
End Call
End call
CLOSE WIDGET
Get A Call Back
000
1
.
2
ABC
3
DEF
4
GHI
5
JKL
6
MNO
7
PQRS
8
TUVW
9
XYZ
*
.
0
+
#
.
Enter Phone Number for Call Back
CLOSE WIDGET
Show Number To Call
000
This is your Business Number
CLOSE WIDGET
Messaging Channel
Text/SMS
OTT/Messaging Apps
Chat
CLOSE WIDGET
SMS/Text
000
This is your Business Number
CLOSE WIDGET
OTT/Messaging Apps
Talk to us using you favorite app!
Facebook msg
line
whatsapp
wechat
viber
yahoo msg
kakao talk
skype
kik msg
hangouts
Snapchat
CLOSE WIDGET
Facebook Messenger

Connect to your Facebook Messenger account to receive alerts and talk with us using Facebook Messenger app!

FACEBOOK MESSENGER
Click to connect
CLOSE WIDGET
Line

Connect to your Line account to receive alerts and talk with us using Line app!

Line
Click to connect
CLOSE WIDGET
Whatsapp

Connect to your Whatsapp account to receive alerts and talk with us using Whatsapp app!

Whatsapp
Click to connect
CLOSE WIDGET
Wechat

Connect to your Wechat account to receive alerts and talk with us using Wechat app!

wechat
Click to connect
CLOSE WIDGET
Viber

Connect to your Viber account to receive alerts and talk with us using Viber app!

viber
Click to connect
CLOSE WIDGET
Yahoo Messenger

Connect to your Yahoo Messenger account to receive alerts and talk with us using Facebook Messenger app!

yahoo MESSENGER
Click to connect
CLOSE WIDGET
Kakao

Connect to your Kakao account to receive alerts and talk with us using Kakao app!

FACEBOOK MESSENGER
Click to connect
CLOSE WIDGET
Skype

Connect to your Skype account to receive alerts and talk with us using Skype app!

skype
Click to connect
CLOSE WIDGET
Kik Messenger

Connect to your Kik Messenger account to receive alerts and talk with us using Kik Messenger app!

kik MESSENGER
Click to connect
CLOSE WIDGET
Hangouts

Connect to your Hangout account to receive alerts and talk with us using Hangout app!

Hangout
Click to connect
CLOSE WIDGET
Snapchat

Connect to your Snapchat account to receive alerts and talk with us using Snapchat app!

snapchat
Click to connect
CLOSE WIDGET
Chat Conversation
We love to talk with you! Leave a chat message down below.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
CLOSE WIDGET
Voice Channel
Video Call an Agent
Screenshare & chat
CLOSE WIDGET
Video Call
Audio
Audio
Mute
Mute
End Call
End call
CLOSE WIDGET
Screenshare & chat
Hangout

to the UconnectedIT agent

Click to share access
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
CLOSE WIDGET
Fill form for email
Click to email
CLOSE WIDGET
Fill form for email
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
CLOSE WIDGET
Click to email
Talk to us using you favorite email client!
Default Email Client
Snapchat
CLOSE WIDGET
OTT/Messaging Apps
FACEBOOK POST
TWITTER POST
LINKEDIN POST
INSTAGRAM
PINTEREST
CLOSE WIDGET
Facebook Post
Make a post on Facebook
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
CLOSE WIDGET
Twitter Post
Make a post on Twitter
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
CLOSE WIDGET
Linkedin Post
Make a post on Linkedin
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
CLOSE WIDGET
Instagram Post
Make a post on Instagram
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
CLOSE WIDGET
Pinterest Post
Make a post on Pinterest
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
CLOSE WIDGET