Close

Reply To: OCU ISSO D Week 01 Lesson 03 Discussion

#85709
Kevin Mehok
Participant

IST3100 Information Systems Security Officer
Authentication Discussion
Kevin Mehok

Authentication is the process of determining whether someone or something is, in fact, who or what it says it is (Shacklett, 2023). What I have learned this week is that authentication technology provides access control for systems by checking to see if a user’s credentials match the credentials in a database of authorized users or in a data authentication server (Shacklett, 2023). The importance in doing this is that authentication assures secure systems, secure processes and enterprise information security (Shacklett, 2023).

There are several authentication types. For purposes of user identity, users are typically identified with a user ID, and authentication occurs when the user provides credentials such as a password that matches their user ID (Shacklett, 2023). In the practice of requiring a user ID and password is known as single-factor authentication (SFA) (Shacklett, 2023). In recent years, companies have strengthened authentication by asking for additional authentication factors, such as a unique code that is provided to a user over a mobile device when a sign-on is attempted or a biometric signature, like a facial scan or thumbprint (Shacklett, 2023). Many of us are similar with this process just by being a smartphone user. This is known as two-factor authentication (2FA) (Shacklett, 2023).

Authentication factors can even go further than SFA, which requires a user ID and password, or 2FA, which requires a user ID, password and biometric signature (Schacklett, 2023). When three or more identity verification factors are used for authentication; for example, a user ID and password, biometric signature and perhaps a personal question the user must answer; it is called multifactor authentication (MFA) (Shacklett, 2023).

God Bless,

Kevin

References:

Shacklett, M. (2023) https://www.techtarget.com/searchsecurity/definition/authentication

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Cybersecurity Certifications for Today's INFOSEC Careers

Mile2 Cybersecurity Certifications is a world-leader in providing accredited education, training, and certifications for INFOSEC professionals. We strive to deliver the best course ware, the strongest Cyber Range, and the most user-friendly exam system in the market.

 

Our training courses follow our role-based Certification Roadmap. Plus, many of our classes include hands-on skill development in our Cyber Range.  We train students in penetration testing,disaster recovery, incident handling, and network forensics.  Additionally, our Information Assurance training certification meets military, government, private sector and institutional specifications.  

 

Accreditations

We've developed training for...

Canada Army Navy Airforce

The Canadian Department of National Defense

USAF

The United States Air Force

Defense Logistics Agency

A United States Counterintelligence Agency

Texas Workforce Commission

Texas Workforce Commission

error: Alert: Content is protected !!