IT Security/Access Control/Authentication and Authorization
< IT Security < Access ControlThis lesson covers authentication and authorization.
Objectives and Skills
Objectives and skills for the authentication and authorization of Security+ certification include:[1]
- Given a scenario, select the appropriate authentication, authorization or access control.
- Identification vs. authentication vs. authorization
- Authorization
- Least privilege
- Separation of duties
- ACLs
- Mandatory access
- Discretionary access
- Rule-based access control
- Role-based access control
- Time of day restrictions
- Authentication
- Tokens
- Common access card
- Smart card
- Multifactor authentication
- TOTP
- HOTP
- CHAP
- PAP
- Single sign-on
- Access control
- Implicit deny
- Trusted OS
- Authentication factors
- Something you are
- Something you have
- Something you know
- Somewhere you are
- Something you do
- Identification
- Biometrics
- Personal identification verification card
- Username
- Federation
- Transitive trust/authentication
Multimedia
- Watch YouTube: Identification, Authentication, and Authorization - CompTIA Security+ SY0-401: 5.2.
- Watch YouTube: Authorization and Access Control - CompTIA Security+ SY0-401: 5.2.
- Watch YouTube: Single-factor Authentication - CompTIA Security+ SY0-401: 5.2.
- Watch YouTube: Multi-factor Authentication - CompTIA Security+ SY0-401: 5.2.
- Watch YouTube: One-time Password Algorithms - CompTIA Security+ SY0-401: 5.2.
- Watch YouTube: CHAP and PAP - CompTIA Security+ SY0-401: 5.2.
- Watch YouTube: Single Sign-on - CompTIA Security+ SY0-401: 5.2.
- Watch YouTube: Federation and Transitive Trust - CompTIA Security+ SY0-401: 5.2.
References
This article is issued from Wikiversity - version of the Sunday, December 13, 2015. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.