2.1.13

Authentication & Contingencies

Test yourself

Authentication and Contingencies

Two very important elements of defensive design are authentication and contingency planning.

Illustrative background for AuthenticationIllustrative background for Authentication ?? "content

Authentication

  • Authentication is the process of checking that a person or system is authorised to use a system.
  • The most common form of authentication is to require users to enter a username and password.
  • Once a user has authenticated themselves, they should be able to see data relevant to themselves and no one else.
Illustrative background for Contingency planningIllustrative background for Contingency planning ?? "content

Contingency planning

  • It is impossible to predict all possible cases of misuse, but there are ways to help reduce errors. For example:
    • Providing helpful prompt messages.
    • Providing error-recovery routes (e.g. an undo feature).
    • Preventing access from certain parts of the system.
    • Using exception handling.

Jump to other topics

1Computer Systems

1.1Data Representation

1.2Data Transmission

1.3Hardware

1.4Software

1.5The Internet & its Uses

1.6Cyber Security

1.7Automated & Emerging Technologies

2Algorithms, Programming & Logic

Unlock your full potential with Seneca Premium

  • Unlimited access to 10,000+ open-ended exam questions

  • Mini-mock exams based on your study history

  • Unlock 800+ premium courses & e-books

Get started with Seneca Premium