From the course: CompTIA Cybersecurity Analyst+ (CySA+) (CS0-003) Cert Prep: 1 Security Operations
Unlock the full course today
Join today to access over 23,000 courses taught by industry experts.
Usernames and access cards
From the course: CompTIA Cybersecurity Analyst+ (CySA+) (CS0-003) Cert Prep: 1 Security Operations
Usernames and access cards
- [Instructor] Identification is one of the basic requirements of any access control system. Users must have a way to identify themselves uniquely to a system using technology that ensures that they will not be confused with any other user of the system. Let's talk about two common identification mechanisms, usernames and access cards. Usernames are by far the most common means of identification for digital systems. Organizations typically provide every individual who will access their computing systems with a unique identifier that they use across all systems. Commonly, usernames take the form of a first initial and last name or a similar pattern that makes it easy for someone seeing the username to identify the person who owns it. Now remember, usernames are for identification, not authentication, so there's no need to keep them secret. Obvious usernames make everyone's lives easier. Organizations also commonly…
Contents
-
-
-
-
-
-
-
Identification, authentication, authorization, and accounting3m 34s
-
(Locked)
Usernames and access cards3m 23s
-
(Locked)
Biometrics2m 42s
-
(Locked)
Authentication factors4m 25s
-
(Locked)
Multifactor authentication2m 35s
-
(Locked)
Something you have4m 24s
-
(Locked)
Password authentication protocols3m 10s
-
(Locked)
Single sign-on and federation3m 9s
-
(Locked)
Passwordless authentication1m 48s
-
(Locked)
Privileged access management2m 31s
-
(Locked)
Cloud access security brokers5m 15s
-
-
-
-
-
-
-
-
-
-
-