click below
click below
Normal Size Small Size show me how
CYB1UofI_FISCH2.5
Summary:Identification&Authentication
| Question | Answer |
|---|---|
| what is identification | an assertion of the identity of some party, whether it be a person, process, system or other entity |
| what is identification only | a claim of identity |
| what does identification not do | it doesn't say anything about any privileges that might be associated with the identity |
| what is authentication | is the process used to validate whether the claim of identity is correct |
| what is authentication different from | verification |
| how is authentication different from verification | verification is a much weaker way of testing someone's identity |
| what is verification | a much weaker way of testing someone's identity |
| what do you use when you perform authentication | factors |
| what are the main factors used in authentication | something you know, something you are, something you have, something you do, and where you are |
| what is an authentication mechanism that includes more than one factor | known as multifactor authentication |
| what does using multiple factors for authentication do | gives you a much stronger authentication mechanism than you might otherwise have |
| what are the common set of tools used for authentication | passwords, tokens and biometric identifiers |
| what does each of the common tools used for authentication have | each of these has its own set of unique challenges that you will need to deal with when you are implementing them as part of your set of security controls |
| what are the steps that take place after identification and authentication | authorization and access control |