Authentication, a most commonly used mechanism to ensure security of systems, is a process of verifying that one attempting to gain access to the systems, is actually legible to. It works by monitoring the user identity information availed at logon and ensuring the identity given is true. However, as much as the sole reason behind authentication is to ensure, it should be made as user friendly as possible (Anderson, 2008).
Mechanisms put in place to ensure user friendly authentication include the two-way authentication and use of biometrics (Quigley, 2005). These, however, have not achieved the full potential to ensure user friendliness and strong authentication, given the complexities involved in making them possible.
Two-way authentication is where the user reveals his/her identity to the system before being allowed to access it, and in return the system is expected to prove authenticity to the user. This helps prevent hacking issues, especially in cases where the user’s passwords and are the only details required for logging in (Quigley, 2005). This mechanism works to eliminate the security issues related to use of passwords, supports centralization of management of various users’ accounts, enhances the performance and productivity of the systems keeping security standards high and allows for flexibility in the use of authentication measures.
Another mechanism is the employment of biometrics. This is both a strong and cost effective mechanism, since it leverages the devices that the users already have. It involves not many passwords but speech detections and use of finger prints. It’s a rather, strong mechanism, fighting against hacking and cracking of passwords to gain access. However, it’s notable that biometrics can be pilferage and used to masquerade uniqueness (Anderson, 2008).
References
Anderson, R. (2008). Security engineering a guide to building dependable distributed systems (2nd ed.). New York, NY: John Wiley & Sons Publishing, Inc. Chapter 2, Usability and Psychology
Quigley, M. (2005). Information Security and Ethics: Social and Organizational Issues.. Hershey: IRM Press.