Unit 9.2
Unauthorized Access and Protection
IT 231: IT and Application
🎯 Learning Objectives
By the end of this session, you will be able to:
- ✅ Define what constitutes unauthorized access.
- ✅ Describe the three main types of authentication factors.
- ✅ Explain the importance of strong passwords and two-factor authentication (2FA).
🔍 The Core Problem: Unauthorized Access
Unauthorized Access: The act of gaining access to a computer system, network, or data without permission.
This is a major security threat that can lead to:
- Data Theft (personal, financial, corporate)
- Identity Fraud & Financial Loss
- System Damage or Disruption
🛡️ Our Defense: Access Control & Authentication
Access Control
The process of restricting who can access a resource.
It's like having a lock on your door.
Authentication
The process of verifying a user's identity.
It's the key that opens the lock.
Access control is the goal; authentication is the method.
📊 The Three Factors of Authentication
Authentication relies on verifying one or more "factors" to prove your identity.
1. Something You Know
Information only you should know.
Examples:
2. Something You Have
A physical object in your possession.
Examples:
3. Something You Are
A unique physical trait (biometrics).
Examples:
🧠 Factor 1: Something You Know
This is the most common factor, but often the weakest link in security.
🤔 Discussion: What makes a password "strong"?
- Length (12+ characters)
- Complexity (upper, lower, numbers, symbols)
- Uniqueness (not reused across sites)
📱 Factor 2: Something You Have
This factor requires you to possess a physical item to prove your identity.
Physical Tokens
- ATM / Smart Cards
- Hardware Security Keys (e.g., YubiKey)
- Company ID Badges
Digital/Virtual Tokens
- One-Time Passwords (OTP) sent to your phone
- Authenticator App codes (Google Authenticator, Authy)
🧬 Factor 3: Something You Are
Biometrics: Authentication using unique physical or behavioral characteristics.
Common Examples
- Fingerprint Scans
- Facial Recognition (Face ID)
- Iris or Retina Scans
- Voice Recognition
Privacy Concerns?
What are the risks if your biometric data is stolen? Unlike a password, you can't change your fingerprint!
⚡ Level Up: Two-Factor Authentication (2FA)
Two-Factor Authentication (2FA): A security method that requires two different factors to verify a user's identity.
Combining factors creates a layered, much stronger defense.
Example: Password (Know) + Code from Phone (Have) = Strong Security
Even if a hacker steals your password, they can't log in without your phone!
🌍 Practical 2FA in Nepal
You probably use 2FA every day without realizing it!
Banking & Digital Wallets
Logging into eSewa, Khalti, or your bank's app often requires:
- Your password/MPIN (something you know)
- An OTP sent to your Ncell/NTC number (something you have)
Government & Social Media
Securing your accounts on Nagarik App, Facebook, or Gmail:
- Your password (something you know)
- A code from an authenticator app or SMS (something you have)
📝 Summary & Key Takeaways
- Unauthorized access is gaining entry without permission and is a serious threat.
- Authentication is how we verify a user's identity to prevent this.
- The three authentication factors are something you know, have, or are.
- Two-Factor Authentication (2FA) provides the strongest security by combining two different factors.