CHAPTER 2Authentication and Authorization: Objective 1.1 Understand the Security Concepts of Information Assurance
As an IT professional, one of the most important things you do is to ensure that only authorized individuals gain access to information, systems, and networks under your protection. You use access controls to provide this assurance.
In this chapter, you'll learn about the fourth subobjective of CC objective 1.1. The remaining material for this objective is covered in Chapter 1, “Confidentiality, Integrity, Availability, and Non-repudiation,” and Chapter 3, “Privacy.” The following subobjective is covered in this chapter:
- Authentication (e.g., methods of authentication, multi-factor authentication (MFA))
ACCESS CONTROL PROCESS ...
Get CC Certified in Cybersecurity Study Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.