Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
This video is a summary of the topics discussed in Module 05 on ID and Access Management. The top-level topic concerns IAAA: Identification, Authentication, Authorization, and Accounting. We note that it's important that these processes occur in order. An outline of the topics from Module 5 are listed below: - Identification - Authentication (multi-factor is often discussed with this) - Type (Knowledge - "something you know") - Type II (Possession - "something you have") - Type III (Biometrics - "something you are") - Single sign-on - provides more efficiency, Kerberos is an example - Access Control Models (discretionary, mandatory, role-based) as well as rule-based - Access Control Methods - Access Control Administration - RADIUS - Data Emanation and countermeasures - Faraday cages, white noise, control zones