1.4.10

Authentication & Passwords

Test yourself

User Access Levels

One technique to improve the security of a network is using user access levels.

Illustrative background for Access rightsIllustrative background for Access rights ?? "content

Access rights

  • Users of a computer system can be given different access rights for different files on the system.
  • For example, for each file on the system we might keep a record of whether each user can:
    • Read the file.
    • Write to the file.
    • Execute the file.
Illustrative background for User access levelsIllustrative background for User access levels ?? "content

User access levels

  • Network users can be arranged into user groups.
  • Each group can then be given different access rights.
  • This makes it easy to manage the access rights of a large group of people (e.g. employees).
Illustrative background for Advantages of user access levelsIllustrative background for Advantages of user access levels ?? "content

Advantages of user access levels

  • We can limit the access rights of 'normal' users on the network. For example:
    • Not allowing them to install software.
    • Not allowing them to create new user accounts.
    • Not allowing them access to confidential information.
  • These rights can be limited to the administrators only.

Passwords

Passwords are one method of providing authentication.

Illustrative background for Purpose of passwordsIllustrative background for Purpose of passwords ?? "content

Purpose of passwords

  • Passwords help to prevent unauthorised users from accessing a device or network.
  • Passwords are one of the simplest authentication methods.
Illustrative background for Issues with passwordsIllustrative background for Issues with passwords ?? "content

Issues with passwords

  • Passwords are only effective if:
    • They remain secret.
    • The password is strong against brute force attacks.
  • Stronger authentication systems can be created by implementing features such as two-factor authentication.
Illustrative background for Principles of a strong passwordIllustrative background for Principles of a strong password ?? "content

Principles of a strong password

  • A strong password should:
    • Be long.
    • Use letters, numbers, and symbols.
    • Be changed regularly.
    • Never be written down.

Jump to other topics

1Computer Systems

1.1Systems Architecture

1.2Memory & Storage

1.3Computer Networks, Connections & Protocols

1.4Network Security

1.5Systems Software

1.6Ethical, Legal, Cultural & Environmental Concern

2Computational Thinking, Algorithms and Programming

Go student ad image

Unlock your full potential with GoStudent tutoring

  • Affordable 1:1 tutoring from the comfort of your home

  • Tutors are matched to your specific learning needs

  • 30+ school subjects covered

Book a free trial lesson