Part 05 – Authentication TYPE I

FacebookTwitterGoogle+LinkedInEmail
Description
This section begins a series in which we investigate each of the authentication types. In this section we have a look at TYPE I authentication. We also point out that the CISSP exam my refer to these authentication types by type number rather than by the descriptive names commonly used to refer to them. TYPE I authentication is concerned with something you know such as a password, PIN, or account number. We note that there's a fine line between the process of identification and authentication. The discussion then turns towards threats and best practices to mitigate threats directed towards TYPE I authentication. A common type of password is what's known as the cognitive password and is derived from information about us. Many passwords are based around a pet's or child's name. Birth dates are perhaps the most commonly used methods. The weakness with cognitive passwords is that much of this information is publicly available about us online. Other types of risks that result from weaknesses with particular methods are discussed along with mitigating strategies.
Learn on the go.
The app designed for the modern cyber security professional.
Get it on Google Play Get it on the App Store

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel