Information security
Information security
INFORMATION SECURITY
Key Management
Authentication
What is Authentication?
Biometric Authentication
This method uses the user physical characteristics, such as
fingerprints, facial features, iris scans or voice pattern
to verify the identity.
Multi-Factor Authentication
MFA use two or more authentication factors, such as password and
OTP, or Fingerprint and PIN, to strengthen authentication.
The Authentication process generally follow
these steps
Identity Assertion
The user or entity asserts its identity, such as a username, email address, or
digital certificates.
Credential Submission
The user submit their authentication credentials, such as
password, biometric or token code.
The Authentication process generally follow
these steps
Verification
The system verify the credentials, if they are correct,
authentication is successful and access is granted. If the
credentials are incorrect, access is denied.
Lecture # 6
Access Control
Access Control
Access Polices
• Rules and Regulation.
• Access polices specify under with conditions and to which resources
access can be granted.
Access Control List
ACLs are lists that specify which user have access to which
resources and what type of operation are allowed or denied to them.
Key Components