Reply To: OCU ISSO D Week 01 Lesson 03 Discussion

Marcena Davis

The objective of identity management, authentication techniques, single sign-on, and access control monitoring is to control who has access to information systems and networks in order to ensure their security and integrity.

Authentication, which involves verifying the identity of users or devices before granting access to sensitive resources, is a term that applies to all of these concepts. Biometric authentication methods such as fingerprint scanning and facial recognition can be used to verify the identity of users, while digital certificates and smart cards can be used to authenticate devices.

Access control is another term that applies to these ideas; it refers to the process of controlling who has access to particular resources based on their identity and level of authorization. Role-based access control (RBAC), which assigns specific permissions to users based on their role or job function, and attribute-based access control (ABAC), which uses a set of attributes or characteristics to determine whether a user should be granted access to a resource, are examples of access control mechanisms.

Single sign-on (SSO) is another concept closely related to identity management and authentication techniques, as it enables users to authenticate once and access multiple resources without re-entering their credentials. This can improve security by reducing the need for users to remember multiple passwords or access credentials, and by making it easier for IT departments to manage user access and permissions.

Access control monitoring entails continuous monitoring of user access and activity in order to detect and prevent unauthorized access and other security incidents. This may involve monitoring access logs, network traffic, and other indicators in order to identify potential threats and respond promptly to security incidents.

Collectively, these concepts play an essential role in ensuring the security and integrity of information systems and networks, and they provide multiple layers of protection against potential threats and attacks.


Please Note:

The support ticket system is for technical questions and post-sale issues.


If you have pre-sale questions please use our chat feature or email .

Cybersecurity Certifications for Today's INFOSEC Careers

Mile2 Cybersecurity Certifications is a world-leader in providing accredited education, training, and certifications for INFOSEC professionals. We strive to deliver the best course ware, the strongest Cyber Range, and the most user-friendly exam system in the market.


Our training courses follow our role-based Certification Roadmap. Plus, many of our classes include hands-on skill development in our Cyber Range.  We train students in penetration testing,disaster recovery, incident handling, and network forensics.  Additionally, our Information Assurance training certification meets military, government, private sector and institutional specifications.  



We've developed training for...

Canada Army Navy Airforce

The Canadian Department of National Defense


The United States Air Force

Defense Logistics Agency

A United States Counterintelligence Agency

Texas Workforce Commission

Texas Workforce Commission

error: Alert: Content is protected !!