2.1.13

Authentication & Contingencies

Test yourself on Authentication & Contingencies

Test your knowledge with free interactive questions on Seneca — used by over 10 million students.

Authentication and Contingencies

Two very important elements of defensive design are authentication and contingency planning.

Authentication

Authentication

  • Authentication is the process of checking that a person or system is authorised to use a system.
  • The most common form of authentication is to require users to enter a username and password.
  • Once a user has authenticated themselves, they should be able to see data relevant to themselves and no one else.
Contingency planning

Contingency planning

  • It is impossible to predict all possible cases of misuse, but there are ways to help reduce errors. For example:
    • Providing helpful prompt messages.
    • Providing error-recovery routes (e.g. an undo feature).
    • Preventing access from certain parts of the system.
    • Using exception handling.
Jump to other topics
1

Computer Systems

1.1

Data Representation

1.2

Data Transmission

1.3

Hardware

1.4

Software

1.5

The Internet & its Uses

1.6

Cyber Security

1.7

Automated & Emerging Technologies

2

Algorithms, Programming & Logic

Practice questions on Authentication & Contingencies

Can you answer these? Test yourself with free interactive practice on Seneca — used by over 10 million students.

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
Answer all questions on Authentication & Contingencies

Unlock your full potential with Seneca Premium

  • Unlimited access to 10,000+ open-ended exam questions

  • Mini-mock exams based on your study history

  • Unlock 800+ premium courses & e-books

Get started with Seneca Premium