From the course: Cisco Certified CyberOps Associate (200-201) Cert Prep: 1 Security Concepts
Unlock the full course today
Join today to access over 22,400 courses taught by industry experts or purchase this course individually.
Verifying authentication
From the course: Cisco Certified CyberOps Associate (200-201) Cert Prep: 1 Security Concepts
Verifying authentication
- [Instructor] Authentication confirms the identity of a process, system or person. It's like presenting your driver's license to the teller at the bank when you want to cash a check. In a computing environment, user authentication can be done in one of several ways. What you know, such as a password, passphrase, pin, or even lock combination. What you have such as a smart card, token or mobile device. What you are is in the form of a biometric which uniquely identify someone. This can include a fingerprint, iris recognition, face or voice recognition. Where you are as far as location either in or out of the network. And something you do such as a swiping motion on your phone. Of all of these, the password is simple and inexpensive. However, it's simply a sequence of characters. A password on its own is a weak security method. So take steps to ensure a strong password. However, with all of the choices today, it's a good…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
Using the principle of least privilege3m 10s
-
Defining access control3m 33s
-
Comparing access control models5m 19s
-
Summarizing triple-A security3m 19s
-
Verifying authentication1m 57s
-
Granting authorization2m 40s
-
Accounting and logging activity3m 42s
-
Challenge: Network diagram54s
-
Solution: Network diagram4m 39s
-
-
-
-