From the course: Security for the SMB: Implementing the NIST Cybersecurity Framework

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

I-AAA

I-AAA

- [Instructor] A common challenge of today's internet is how do you prove who's on the other side of the computer? In other words, how do we know who's approved to access company computers and how do we know it's actually that person? This is the concept behind identity, access, authentication, and authorization. Let's start with identification. This is usually your user ID, username, or email. It's something tied to you and it may or may not be kept secret. The other part of identity is proving it's really you and not an imposter. On the internet, that can be a challenge. So we rely on authentication. This is where you verify your identity using something unique to you. There are different ways to do this. In computers, we're used to using a password, passphrase, or PIN, which is something you know. Many applications now have alternative methods such as something you have, such as a smartcard, token, device, or…

Contents