What is logical security?

Logical security concerns the process of using software techniques to verify the user permissions on a specific computer network or system. The concept is part of a more complete computer security area that includes both hardware and software methods to secure a terminal or network. When discussing logical security, you should consider different techniques used that include usernames and passwords, token security and two -way verification in the system. Anyone who has ever used an online banking website or even a social network system will be familiar with this concept. If the network has been configured to use password authentication, users trying to sign in to a specific network terminal, they are first forced to prove their login information by entering the user name and password. The primary advantage is simplicity; Users need nothing more than TPRO access to the system have remembered the username and password information. One of the main disadvantages is thatThe computer does not have a way to check whether an individual using a particular combination of username and password is an authorized user; No doubt users can steal usernames and passwords to break the system.

Token security is a logical security technique that includes the use of key cables or other physical devices to verify the user in the network. Once the user has crossed his card in the system, he gets access to the computer. Some popular types of token devices contain a constantly changing code that moves to a new value every minute, keeping the system safe against individuals trying to duplicate security cards. Again, as with password verification, there is no real protection against individuals who have stolen another person's access card to get access to the system.

Bidirectional verification includes exchange of questions and restThey know between a user and a computer system. When the user tries to log in to the system, the computer sends the question-know as a "prompt" -a the end user must answer the correct result to get access to the system. The advantage of this type of logical security technique is that the system is not tied to a specific combination of username and passwords; There may be any number of challenges that prevent unauthorized users from easily getting access to the system simply stole one particular combination of username and passwords.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?