O'Reilly logo

Inside Network Security Assessment: Guarding Your IT Infrastructure by David Kim, Michael Gregg

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

The Role Authentication, Authorization, and Accountability Play in a Secure Organization

Authentication, authorization, and accounting are three terms sometimes referred to as “AAA.” Together, these items represent a framework for enforcing policy, controlling access, and auditing user activities. These three items are critical for security.

Authentication

At most, basic authentication is a method of identification. It grants access to physical or logical resources based on someone’s identification. Individuals typically identify and authenticate themselves in one of these methods: something you know, something you have, or something you are.

Passwords—Something You Know

The use of computer passwords goes back to the early days of computing. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required