Authentication (Cambridge (CIE) IGCSE ICT)

Revision Note

Robert Hampton

Written by: Robert Hampton

Reviewed by: James Woodhouse

Updated on

Authentication

What is authentication?

  • Authentication is the process of ensuring that a system is secure by asking the user to complete tasks to prove they are an authorised user of the system

  • Authentication is done because bots can submit data in online forms

  • Authentication can be done in several ways, these include

    • Zero login & biometrics

    • Magnetic stripe

    • Smart cards

    • Physical & electronic tokens

Authentication method

Description

Advantages & disadvantages

Zero login & biometrics

  • Allows a user to login without using a username & password

  • Uses biometric data (fingerprint, face, gestures) to create a profile of a user so that they can log in without having to authenticate each time

  • Convenient for devices when users need to log in frequently throughout the day e.g. smartphones

  • If compromised, biometric data cannot be changed

  • Biometric recognition can be less than perfect and lead to failed login attempts and user frustration

Magnetic stripe

  • Magnetic stripe contains unique data used to authenticate a user e.g. ID, name & date of birth

  • When swiped through a magnetic card reader, details are used to identify a user

  • Easy and cheap to setup

  • Cards can be used to access multiple systems

  • Cards can be remotely deactivated

  • Magnetic stripes can wear

  • Card readers must be maintained

  • Less secure than biometrics (easy copied)

Smart cards

  • Enhances a magnetic stripe cards with the addition of a microchip to create a contactless card

  • Microchip stores additional information such as a pin to add extra layer of security

  • Data in encrypted

  • More secure than magnetic stripe cards

  • Multi-purpose

  • Transactions can be much faster

  • More expensive to manufacture

  • Lack of compatibility can cause inconvenience

Physical tokens

  • A physical device used to authenticate a user remotely

  • The device generates a random one time password (OTP) that a user must type in

  • Banks may ask customers to insert their bank card into the device and use the OTP to access internet banking

  • OTPs change after a few minutes

  • Very secure

  • Inconvenient to the user as they need a physical device, card and login credentials to access one site

Electronic tokens

  • Software token generated by an app

  • App generates OTPs

  • Users authenticate in app e.g. fingerprint and OTP is generated

  • Very secure

  • More convenient

You've read 0 of your 5 free revision notes this week

Sign up now. It’s free!

Join the 100,000+ Students that ❤️ Save My Exams

the (exam) results speak for themselves:

Did this page help you?

Robert Hampton

Author: Robert Hampton

Expertise: Computer Science Content Creator

Rob has over 16 years' experience teaching Computer Science and ICT at KS3 & GCSE levels. Rob has demonstrated strong leadership as Head of Department since 2012 and previously supported teacher development as a Specialist Leader of Education, empowering departments to excel in Computer Science. Beyond his tech expertise, Robert embraces the virtual world as an avid gamer, conquering digital battlefields when he's not coding.

James Woodhouse

Author: James Woodhouse

Expertise: Computer Science

James graduated from the University of Sunderland with a degree in ICT and Computing education. He has over 14 years of experience both teaching and leading in Computer Science, specialising in teaching GCSE and A-level. James has held various leadership roles, including Head of Computer Science and coordinator positions for Key Stage 3 and Key Stage 4. James has a keen interest in networking security and technologies aimed at preventing security breaches.