Why should we have an Authentic Data Network?


Security concerns continue to undermine trust in online businesses. Phishing is a subtle new form of social engineering. Criminals present themselves as legitimate entities to obtain personal information such as credit card numbers, passwords and social security numbers from unsuspecting consumers.

Importance of authentic data Network

Typically, these individuals use fraudulent websites or email addresses of well-known companies to send spam messages that deceive the recipient into providing confidential data. The identity of a subject during an authentication attempt can be mainly checked in three different ways:

  • What is known: The user is associated with a username and password. Usually, the username is a string containing a name, an email address, or a nickname. On the other hand, the password is a string, which generally has no particular meaning. It is like a key to be inserted, demonstrate that you know it, and indeed be who declares himself. The password should be complex enough not to be guessed and not too difficult to forget.
  • What you have: a digital certificate or a smart card. On the other hand, a smart card is a plastic card, like an actual credit card, and requires external hardware architecture to be read.
  • It contains a microchip where various information about the owner is stored, and sometimes this information is just in the form of a digital certificate.
  • What it is: Personal biometric data is used to identify the user. These can be voice recognition, fingerprint, and hand size, retinal scan etc. In any case, complex physical devices are required to carry out the recognition, leading the latter to be still little in use. InterconnectDATA is to have a single trusted authentication service for multiple applications, which uses a particular security protocol of his choice.

Advantages of authentication data network methods

Each has particular advantages in efficiency, safety, guarantee, and implementation costs in the three methodologies seen above.

  • If a username and password of a contact in a chat are intercepted, the problem, while not trivial, is not relatively serious. The intruder can impersonate the user by sending an email or scrolling through the contact list. However, this method also has other problems for users and suppliers of the requested services.
  • The services available and required by the vast majority of users are many, so it is necessary to remember many different passwords. This can lead to always having the same password for multiple services or choosing too simple ones, facilitating interception. For some, the constant requests for authentication are considered inconvenient and an obstacle to navigation.
  • In addition, various services require that the password be changed after a certain period, beyond which it is considered to have expired. This is to increase safety further.
  • The user sometimes hires third parties to help with the authentication process for these reasons. These can be local or remote software.
  • Locally, password management can be delegated to the user’s web browser. This can remember all the various passwords of the various sites visited, making life easier. However, the problem is not solved if the user connects to the internet from different locations, such as a library or an internet café.
  • Remotely, password management can be assigned to an internet proxy server, possibly managed by the internet provider or a specific network service. The mechanism is similar to the previous one, except that in this case, the user authenticates only once to the proxy, which, after user authentication, takes care of automatically entering passwords when requested. This technique is possible. However, not easy to implement and use on a world scale.

This is the idea behind centralized authentication and the CAS server. The authentication device can also be configured to authorize or not a user to access a service, but as already mentioned, this is another problem.