Authentication

The cornerstone of cybersecurity

In the realm of cybersecurity, authentication reigns supreme. Why? Well software isn’t like a water pipeline that can break at any place it is pierced. Software breaks at the weakest link. The weakest links in software are of a few types:

  1. Bugs — these are unintentional software logic snippets, where software “breaks” when the bug case is reproduced.
  2. Capacity — when the resource running the software seemingly cannot take the “load” of high user traffic.
  3. Security — when software I/O isn’t “secure”, meaning in some manner a malicious actor can abuse the software for their criminal needs.

Authentication is a vital process that makes software secure. By properly authenticating software inputs, software can execute requests without causing harm to its users.

A strong authentication system makes a software system cyber strong.

--

--

Saurav Bhattacharya

I think and write about complexity, consciousness, wisdom, beauty and love.