Authentication and Access Control
Yes, communication and accessing the information you need is all good, but knowing exactly who it is àt the other end of the connection is vital. This means you need ways to confirm that the person or computer at the other end of the conection is really supposed to be accessing the resource it's trying to, and even whether the resources or entities that you're contacting are really who and what they appear to be. If you don't have network security firmly in place, you're flying dangerously blind--you could be inadvertently exposing critical data to people who have no right to see that intormation and mayeven intend to exploit it in a big way! So, on this blog, we'll focus on some very important pieces of the security puzzle; two of the first things on our list are Security filtering and User authentication. Security Filtering. How do we know who's really at the other end of our connections? The answer to that may seem simple enough because the compu...