Logical security uses software-based techniques to authenticate user privileges on a network or computer system. Techniques include password authentication, token security, and two-way authentication. Each has benefits and drawbacks, but all aim to protect against unauthorized access.
Logical security refers to the process of using software-based techniques to authenticate a user’s privileges on a specific network or computer system. The concept is part of the broader field of computer security, involving hardware and software methods for protecting a terminal or network. When discussing logical security, one should consider the different techniques used, which include usernames and passwords, token security, and two-way authentication on a system.
Password authentication is perhaps the most common and familiar type of logical security. Anyone who has ever used an online banking site or even a social networking system will be familiar with this concept. When a network has been configured to use password authentication, users attempting to access a specific terminal on the network are first forced to prove their credentials by entering a username and password. The main benefit here is simplicity; users need nothing more than the stored username and password to access the system. One major drawback is that the computer has no way of verifying whether the individual using a specific username and password combination is the authorized user; unscrupulous users can then steal usernames and passwords to crack the system.
Token security is a logical security technique that involves the use of key cards or other physical devices to authenticate a user to the network. Once the user inserts his card into the system, he is granted access to the computer. Some popular types of token devices contain an ever-changing code that switches to a new value every minute or so, keeping the system secure against individuals attempting to duplicate security cards. Again, as with password authentication, there is no real protection against individuals stealing another person’s card to gain access to the system.
Two-way authentication involves an exchange of questions and answers between the user and the computer system. When the user tries to access the system, the computer sends a question, known as a “challenge”, and the end user must answer with the correct result to gain access to the system. The advantage of this type of logical security technique is that the system is not tied to a specific username and password combination; there can be any number of challenges, preventing unauthorized users from easily gaining access to your system simply by stealing a specific username and password combination.
Protect your devices with Threat Protection by NordVPN