Time
3 hours 20 minutes
Difficulty
Beginner
CEU/CPE
4

Video Transcription

00:00
when it comes authentication. There are really three kind of four authentication types are something, you know,
00:08
something you have and something you are.
00:11
So when a person wants to be verified, as they are, who they say they are, right, they have to supply either something they know something they have or something they are something you know is usually information based. This is things like typing in a password
00:26
or have, like a secret secret code that you read out to someone or something like that. It's information. Something that you have stored in your memory.
00:35
Something you have is a physical object. This is stuff like I d cards
00:41
key fobs. Yes, something maybe something with, like a chip inside where you inserted in and you get verified that way and then something you are. This is things, clay. Biometric. So whether it's like your fingerprint scanner, maybe like an eye scanner, Or maybe even so, like a biometric, such as, like your voice
01:00
or, you know, the way you write your signature some something like that that can also be an authentication type.
01:04
And then there's also multi factor authentication, which is really just multiple levels off authentication. So multi factor authentication is taking one of these three authentication types
01:19
and then adding a 2nd 1 to it. So one example. Multi factor authentication would be something you know and something you have or something you have and something you wore. You cannot you multi multi factor. Authentication is not,
01:34
you know to two different things of something, you know. Like if, for example, if you type in a password and then type in a pin that is not off, that is not multi factor authentication. Multi factor authentication would be typing in a password and then,
01:52
you know, using a card with a little chip inside.
01:55
That would be an example of multi factor authentication.
02:00
Now authorization there. Three. There's a bunch of models of authorization, but three of the most important and the most common are the mandatory
02:10
bottle, the discretionary model and the role based model.
02:15
So the 1st 1 is mandatory. So this is like it's known as mandatory access control, otherwise known as M A C.
02:24
On basically, to get access to things each object on either and like a computer or file system, each file they all have sensitivity levels right, so they all have kind of like a level, and basically they all have labels.
02:40
And to get access to that example there digs. I get access to that resource,
02:46
you have to have the matching corresponding legal. So if there's a file on a computer that says top secret then and you're trying to access that file, then you would need to have the top secret label yourself.
03:00
Teoh have access to that file. The 2nd 1 is the discretionary access Control, otherwise known as D A C. And this is where the owner or creator of the files and objects and resource is. This is where they decide who gets permissions. They set the permissions as to who gets access to what,
03:21
and finally, the 3rd 1 is role based access control. This means you get access to information and objects based upon your role within the organization or what you are trying to do. So, for example, and company right, everyone who has the roll off payroll gets access to all the payroll. Resource is
03:40
everyone who is in accounts receivable gets access to all of the accounts receivable stuff they do not get access to anything else besides that,
03:50
All right, so if you're in the payroll, you get access to the payroll information, but you do not get access to the marketing information.
04:00
So in this video we took a look at the C I A and D A D triangles. We took a look at some cybersecurity principles. Two of the most important ones. They are non repudiation, where you cannot deny having sent a message or have did or did something.
04:19
And the other one is access control,
04:21
which is the process off identifying yourself, verifying and then seeing what you actually get access to after verification. We also took a look at a couple types of authentication and a couple authorization models.
04:40
Quiz Quiz Time.
04:42
Ashley from HR is printing out the results of a drug test of an employee and accidentally sends the results to the wrong printer. And somebody else sees the results.
04:51
Which part of the C I. A. D I. D A. D Triangles is involved in this scenario.
04:58
A confidentiality and disclosure.
05:01
Be integrity and alteration or see availability and denial.
05:09
The correct answer is a confidentiality and disclosure. Drug tests are based on confidential information and the fact that she sent that to the wrong printer and somebody else who was not in HR Saul it while then she has a confidentiality problem on her hands
05:30
because that information was disclosed
05:31
to someone out. She no longer has confidentiality but disclosure.
05:38
I hope you guys learned a lot in this lesson, and I'll see you next time.

Up Next

Cyber Network Security

In the Cyber Network Security course, students will get an overview of key principles of cybersecurity and learn about different threats, regulations, and cybersecurity ethical considerations.

Instructed By

Instructor Profile Image
Pete Cipolone
Cyber Security Analyst and Programmer
Instructor