Chapter 5. System Access

Learning Objectives

After studying this chapter, you should be able to:

  • Discuss the three general means of authenticating a user’s identity

  • Explain the mechanism by which hashed passwords are used for user authentication

  • Present an overview of password-based user authentication

  • Present an overview of hardware token-based user authentication

  • Present an overview of biometric user authentication

  • Summarize some of the key security issues for user authentication

  • Understand the different types of access control

  • Present an overview of identity and access management concepts

This chapter and Chapter 6, “Malicious Software and Intruders,” provide an overview of technical measures that have been developed to meet the objectives ...

Get Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.