Chapter 10


An important consideration for all security programs is how approved individuals identify themselves to different systems and how that information is used to verify that the individuals are who they say they are. The process of verifying the identity of an individual is known as authentication. Before employees in an organization can gain access to secure areas of the building, or access resources on a server, they must be authenticated.

This chapter discusses the concept of authentication and reviews some of the common authentication ...

Get CompTIA Security+ Certification Study Guide, Fourth Edition (Exam SY0-601), 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.