Ch2 - 2.02 - Understanding Authentication and Authorization Flashcards

1
Q

List Popular Methods Used for Identification and

Authentication Purposes

A
  1. Username (& Password)
  2. Smartcard (& PIN. E.g: Credit/Debit Card)
  3. Token (With Username & Password&raquo_space; MFA)
  4. Biometrics (E.g: Fingerprint, Retina)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Identification and Authentication

A

Identification happens before authentication and is the process of having users identify themselves to the system.

The most popular method companies use to
identify individual users is to give each user a unique username. The users type their username into the system in order to identify themselves.

After the user inputs the identifying information (the username), the user inputs the password for that account for purposes of authentication. The information is then sent to an authentication system that is responsible for verifying that the username and password are valid.

If the username and password are correct, the user is granted access to the system, but if the information is incorrect, an error is displayed and access is denied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authorization

A

Once the user has been authenticated, they are given access to different resources; this is known as authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly