SlideShare a Scribd company logo
Topic : Authentication
And Authorization In
Data Security.
Name : Shimpi Someshwari Sanjay
Roll No : 028
Subject : ADBMS
What is Authentication ?
Authentication is all about validating your credentials like Username and
Password to verify your identity.
USER/PROCESS
TRUE GENUINE VALID
Why we need Authentication ?
1. Computer Networks are prone to attacks.
2. If no authentication process , then attacker might have access to view
some important information.
3. Also verifying a User's identity is often required to allow access to
confidential data.
Advantages Of
Authentication :
1. It enables organization to keep their
network secure.
2. It protects resources like computer
systems , networks , database ,
website or services.
3. It allows only those users who are
authenticated as well as permitted to
have the access on protected
resources.
How to create an Authenticator ?
ENCRYPTION MAC HASH
Symmetric Encryption
Asymmetric Encryption
CMAC ,
HAMC
MD5 , SHA-1
How to Authenticate a User ?
USER AUTHENTICATOR
USER ID = 0001
PASSWORD = *****
Factors Of Authentication :
1. Something the user
KNOWS.
2. Something has the
HAS
3. Something the user IS.
Examples Of Authenticating User :
1) 2) 3)
Authentication of message :
Message
Encryption
Algorithm
Private Key of Sender
Cipher Text
Decryption
Algorithm
Public Key of Sender
Message
Plain Text
Plain Text
Sender Receiver
What is
Authorization ?
Authorization in data
security is the process of
giving the user
permission to access a
specific resource or
function.
Advantages of Authorization ?
1. Authorization lists simplify managing authorities.
2. Authorization lists provide a good way to secure files.
Difference Between Authentication And Authorization :
How we create new User and Grant Permission
to them in Oracle?
Creating New User Displaying User's
Connected to new user
Thank You !!!

More Related Content

PPTX
COMPUTER-AUTfejenfejejeeejejfejnejHENpptx
PPTX
Web authentication & authorization
PPTX
SCWCD : Secure web
PPTX
SCWCD : Secure web : CHAP : 7
PPTX
AEIC 324 Topic 2 - Access Control Techniques.pptx
PPTX
Authentication and session v4
PDF
Remote Access Policy Is A Normal Thing
PPTX
OWASP_Training.pptx
COMPUTER-AUTfejenfejejeeejejfejnejHENpptx
Web authentication & authorization
SCWCD : Secure web
SCWCD : Secure web : CHAP : 7
AEIC 324 Topic 2 - Access Control Techniques.pptx
Authentication and session v4
Remote Access Policy Is A Normal Thing
OWASP_Training.pptx

Similar to ADBMS.pptx (20)

PDF
Kebocoran Data_ Tindakan Hacker atau Kriminal_ Bagaimana kita mengantisipasi...
PPTX
Ethical Hacking .pptx
PDF
How to Find and Fix Broken Authentication Vulnerability
PPTX
IEEE WEB DOCUMENT PPT FOR EXPLANATION OF THE TOPIC
PPTX
CIA Triad In Information Security : Cyber
PPTX
Chapter 2 System Security.pptx
PDF
SECURITY THE POWER OF MULTI-FACTOR AUTHENTICATION
PDF
ISC2_Cyber_Security_Notes.pdf
PDF
Understanding User Authentication- Methods, Importance, and Best Practices.pdf
PPTX
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
PDF
Module 4 (enumeration)
PDF
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
PDF
Authentication and Authorization Defined_ What's the Difference_.pdf
PDF
information security Lecture by cyber security
PPTX
Broken Authentication and Authorization(1).pptx
PDF
76 s201923
PPTX
Presentation On CLoudSweeper By Harini Anand
PPTX
PPT
Andrews whitakrer lecture18-security.ppt
PPTX
Week 01 - Cryptography and Network Security.pptx
Kebocoran Data_ Tindakan Hacker atau Kriminal_ Bagaimana kita mengantisipasi...
Ethical Hacking .pptx
How to Find and Fix Broken Authentication Vulnerability
IEEE WEB DOCUMENT PPT FOR EXPLANATION OF THE TOPIC
CIA Triad In Information Security : Cyber
Chapter 2 System Security.pptx
SECURITY THE POWER OF MULTI-FACTOR AUTHENTICATION
ISC2_Cyber_Security_Notes.pdf
Understanding User Authentication- Methods, Importance, and Best Practices.pdf
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
Module 4 (enumeration)
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Authentication and Authorization Defined_ What's the Difference_.pdf
information security Lecture by cyber security
Broken Authentication and Authorization(1).pptx
76 s201923
Presentation On CLoudSweeper By Harini Anand
Andrews whitakrer lecture18-security.ppt
Week 01 - Cryptography and Network Security.pptx
Ad

Recently uploaded (20)

PDF
Landforms and landscapes data surprise preview
PPTX
Introduction and Scope of Bichemistry.pptx
PPTX
ACUTE NASOPHARYNGITIS. pptx
PPTX
How to Manage Starshipit in Odoo 18 - Odoo Slides
PPTX
Nursing Management of Patients with Disorders of Ear, Nose, and Throat (ENT) ...
PPTX
How to Manage Loyalty Points in Odoo 18 Sales
PDF
High Ground Student Revision Booklet Preview
PPTX
Presentation on Janskhiya sthirata kosh.
PPTX
How to Manage Global Discount in Odoo 18 POS
PPTX
Cardiovascular Pharmacology for pharmacy students.pptx
PDF
3.The-Rise-of-the-Marathas.pdfppt/pdf/8th class social science Exploring Soci...
PPTX
Strengthening open access through collaboration: building connections with OP...
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
Module 3: Health Systems Tutorial Slides S2 2025
PPTX
vedic maths in python:unleasing ancient wisdom with modern code
PDF
5.Universal-Franchise-and-Indias-Electoral-System.pdfppt/pdf/8th class social...
PDF
English Language Teaching from Post-.pdf
PDF
Types of Literary Text: Poetry and Prose
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
Phylum Arthropoda: Characteristics and Classification, Entomology Lecture
Landforms and landscapes data surprise preview
Introduction and Scope of Bichemistry.pptx
ACUTE NASOPHARYNGITIS. pptx
How to Manage Starshipit in Odoo 18 - Odoo Slides
Nursing Management of Patients with Disorders of Ear, Nose, and Throat (ENT) ...
How to Manage Loyalty Points in Odoo 18 Sales
High Ground Student Revision Booklet Preview
Presentation on Janskhiya sthirata kosh.
How to Manage Global Discount in Odoo 18 POS
Cardiovascular Pharmacology for pharmacy students.pptx
3.The-Rise-of-the-Marathas.pdfppt/pdf/8th class social science Exploring Soci...
Strengthening open access through collaboration: building connections with OP...
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Module 3: Health Systems Tutorial Slides S2 2025
vedic maths in python:unleasing ancient wisdom with modern code
5.Universal-Franchise-and-Indias-Electoral-System.pdfppt/pdf/8th class social...
English Language Teaching from Post-.pdf
Types of Literary Text: Poetry and Prose
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Phylum Arthropoda: Characteristics and Classification, Entomology Lecture
Ad

ADBMS.pptx

  • 1. Topic : Authentication And Authorization In Data Security. Name : Shimpi Someshwari Sanjay Roll No : 028 Subject : ADBMS
  • 2. What is Authentication ? Authentication is all about validating your credentials like Username and Password to verify your identity. USER/PROCESS TRUE GENUINE VALID
  • 3. Why we need Authentication ? 1. Computer Networks are prone to attacks. 2. If no authentication process , then attacker might have access to view some important information. 3. Also verifying a User's identity is often required to allow access to confidential data.
  • 4. Advantages Of Authentication : 1. It enables organization to keep their network secure. 2. It protects resources like computer systems , networks , database , website or services. 3. It allows only those users who are authenticated as well as permitted to have the access on protected resources.
  • 5. How to create an Authenticator ? ENCRYPTION MAC HASH Symmetric Encryption Asymmetric Encryption CMAC , HAMC MD5 , SHA-1
  • 6. How to Authenticate a User ? USER AUTHENTICATOR USER ID = 0001 PASSWORD = *****
  • 7. Factors Of Authentication : 1. Something the user KNOWS. 2. Something has the HAS 3. Something the user IS.
  • 8. Examples Of Authenticating User : 1) 2) 3)
  • 9. Authentication of message : Message Encryption Algorithm Private Key of Sender Cipher Text Decryption Algorithm Public Key of Sender Message Plain Text Plain Text Sender Receiver
  • 10. What is Authorization ? Authorization in data security is the process of giving the user permission to access a specific resource or function.
  • 11. Advantages of Authorization ? 1. Authorization lists simplify managing authorities. 2. Authorization lists provide a good way to secure files.
  • 12. Difference Between Authentication And Authorization :
  • 13. How we create new User and Grant Permission to them in Oracle? Creating New User Displaying User's