the+need+for+encrypton,+authentication+techniques+and+User+identification+and+passwords

=The need for encryption, authentication techniques, User identification and passwords.=


 * By Edward Fitzgerald**

There is great need for encryption, authentication techniques, user identification and passwords. These will all protect your computer from damage or from hackers (people who gain access to your computer and then illegally steal your data.).

Encryption is only one method which can be used when you want to be able to protect your computer from harm and hackers. Encryption is when you put a digital key or password on your work that will then transform your data into a unreadable file if you don't have the digital key and password. It is best to encrypt something that you will transfer over the internet because it has high chances of being stolen because it is rather easy when it is being transfered so much from computer to computer. Now the best way to transfer this digital key is face to face because otherwise then the digital key might be taken by someone else will you transfer it across the internet. Encryption is a pretty easy thing to do but if one of your documents really needs to be encrypted for its safety it is extremely easy to find a software to help you increase your security.

Here are a few authentication techniques which can be used to prove that you are who you say you are. The first is using your fingerprint because everyone has a unique fingerprint that is the not the same for anyone in the world. This method is used nearly everywhere in the world and a example of this is when they use them in police stations to record who you are. An another method is using a retinal scan which will scan your eye. This method is not so widely used because it is expensive and not easy to acquire one. A third method is DNA sample which can be gotten from a strand of hair or from a small blood sample. This is mainly used in crime scenes when they find blood or a strand of hair and then they carry out tests to find out who the person is. The last example is the voice scan. All you do is say a certain phrase and the scanner will recognise your voice.

Now the last way you can protect from hackers and other illegal actions that steal your information is to put a password. Now not many people see that this can make that much of a difference but in fact this is probably the easiest way to protect your computer and if done right can defend it from basic password crackers. If we are to assume that it can only guess 100,000 passwords per second (which most computer can easily pass nowadays) and your password is 7 digits long then it would take a password cracker nearly 4 months to hack your computer. So if you are to put a simple 7 digit long password then you would increase your security of your computer dramatically. To create a better password all your have to do is make it 7+ digits long and use higher case letters, lower case letters and if you are allowed use some punctuation aswell. This will make the possibilities increase so much that by the time it is done you will have been warned so long ago it wouldn't even matter.