Chapter 10

System Access

“Badges? We ain’t got no badges! We don’t need no badges! I don’t have to show you any stinking badges!!”

The Treasure of the Sierra Madre, 1948

Learning Objectives

After studying this chapter, you should be able to:

  • Discuss the three general means of authenticating a user’s identity.

  • Explain the mechanism by which hashed passwords are used for user authentication.

  • Present an overview of password-based user authentication.

  • Present an overview of hardware token-based user authentication.

  • Present an overview of biometric user authentication.

  • Summarize some of the key security issues for user authentication.

  • Present an overview of system access best practices.

This chapter presents an overview of system access concepts, ...

Get Effective Cybersecurity: A Guide to Using Best Practices and Standards, First Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.