Understanding Identification and Authentication

In Module 3, we defined several information security concepts, including identification, authentication, and authorization. These concepts will be revisited and expounded upon in the next several modules, as we go more in depth in defining them and the methods and technologies used to facilitate them. First, in this module, we’ll look at identification methods as well as authentication factors. In Modules 12, 13, and 14, we’ll look at authorization concepts, authentication methods, and managing account credentials, respectively.

Authentication Concepts

Before we get into the details of identification and authentication, let’s revisit what these terms mean. They are often used interchangeably, ...

Get Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401) now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.