Chapter 10

System Access

“Badges? We ain’t got no badges! We don’t need no badges! I don’t have to show you any stinking badges!!”

The Treasure of the Sierra Madre, 1948

Learning Objectives

After studying this chapter, you should be able to:

  • Discuss the three general means of authenticating a user’s identity.

  • Explain the mechanism by which hashed passwords are used for user authentication.

  • Present an overview of password-based user authentication.

  • Present an overview of hardware token-based user authentication.

  • Present an overview of biometric user authentication.

  • Summarize some of the key security issues for user authentication.

  • Present an overview of system access best practices.

This chapter presents an overview of system access concepts, ...

Get Effective Cybersecurity: A Guide to Using Best Practices and Standards now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.