We are independent & ad-supported. We may earn a commission for purchases made through our links.
Advertiser Disclosure
Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.
How We Make Money
We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently of our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.
Security

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

What Is Logical Security?

By T.S. Adams
Updated: May 16, 2024
Views: 22,021
Share

Logical security refers to the process of using software-based techniques for authenticating a user's privileges on a specific computer network or system. The concept is a part of the more complete field of computer security, which involves both hardware and software methods for securing a terminal or network. When discussing logical security, one should consider the different techniques used, which include usernames and passwords, token security, and two-way authentication on a system.

Password authentication is perhaps the most common and familiar type of logical security. Anyone who has ever used an online banking site or even a social networking system will be familiar with this concept. When a network has been configured to utilize password authentication, users attempting to log in to a specific terminal on the network are first forced to prove their credentials by inputting a username and password. The primary advantage here is simplicity; users need nothing more than their memorized username and password information to access the system. One major disadvantage is that the computer has no way to check whether the individual using a specific username and password combination is the authorized user; unscrupulous users can therefore steal usernames and passwords to crack the system.

Token security is a logical security technique that involves the use of keycards or other physical devices to authenticate a user on the network. Once the user swipes his card in the system, he is granted access to the computer. Some popular types of token devices contain a constantly changing code which switches to a new value every minute or so, keeping the system secure against individuals attempting to duplicate the security cards. Again, as with password authentication, there is no real safeguard against individuals stealing another person's passcard to gain access to the system.

Two-way authentication involves a question and answer exchange between the user and the computer system. When the user attempt to log in to the system, the computer will send a question — known as a "challenge" — and the end-user must reply with the correct result to gain access to the system. The advantage to this type of logical security technique is that the system is not tied down to a specific username and password combination; there can be any number of challenges, preventing unauthorized users from easily gaining access to the system by simply stealing one specific username and password combination.

Share
EasyTechJunkie is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.
Discussion Comments
Share
https://www.easytechjunkie.com/what-is-logical-security.htm
Copy this link
EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.

EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.