From the course: Cisco Certified CyberOps Associate (200-201) Cert Prep: 1 Security Concepts

Unlock the full course today

Join today to access over 22,400 courses taught by industry experts or purchase this course individually.

Verifying authentication

Verifying authentication

- [Instructor] Authentication confirms the identity of a process, system or person. It's like presenting your driver's license to the teller at the bank when you want to cash a check. In a computing environment, user authentication can be done in one of several ways. What you know, such as a password, passphrase, pin, or even lock combination. What you have such as a smart card, token or mobile device. What you are is in the form of a biometric which uniquely identify someone. This can include a fingerprint, iris recognition, face or voice recognition. Where you are as far as location either in or out of the network. And something you do such as a swiping motion on your phone. Of all of these, the password is simple and inexpensive. However, it's simply a sequence of characters. A password on its own is a weak security method. So take steps to ensure a strong password. However, with all of the choices today, it's a good…

Contents