Identification and Authentication Techniques
Explain identification and authentication techniques.
From an access control standpoint, you have to tell the system who you are and then prove to the system you are who you say you are. For example, when I go to the airport to pick up my electronic ticket, I walk up to the counter and say my name and where I am going. Based solely on that, they look up my information and find my reservation. However, before they will give me the ticket, I have to prove to them I am really who I say I am—and I usually do that with either a driver's license or a passport. After I have authenticated, they give me my ticket. The same thing has to be done when you try to gain access to a computer system. You present a ...
Get CISSP Training Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.