Identity and Access Management

In this chapter you will learn:

•  Various parameters for context-based authentication

•  Security issues and best practices for using common authentication protocols

•  Security issues with various components of the network environment

•  Commonly used exploits against authentication and access systems

The value of identity of course is that so often with it comes purpose.

—Richard Grant

A 2016 study from Shape Security, a Silicon Valley cybersecurity company, asserted that nearly 90 percent of the password attacks on public-facing company portals were done using automated tools to reuse login and password credentials collected from other breaches. This works because we tend to pick passwords that ...

Get CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (Exam CS0-001) now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.