Mile2 Cybersecurity Certifications

Cybersecurity Certifications

OCU C)ISSO B Discussion Lesson 03

Viewing 1 reply thread
  • Author
    Posts
    • #99291
      Manny Varela
      Keymaster

      Explain what these have in common:  identity management, authentication techniques, single sign-on, and access control monitoring.  Use at least 2 terms with each when discussing the commonalities.  Present examples from both the text and the video.

    • #99502
      Joseph Doss
      Participant

      They all involve access to information. Authentication techniques such as passwords/passphrases/SSO etc. all are methods of gaining access to information. Authentication can be something you know (passwords), something you have (key/card), or something you are (fingerprint, face ID). Access control monitoring is a method of keeping track of who is accessing data and if they should have access or not. Systems such as IDS and IPS can detect breaches and alert system admins of the intrusions.

Viewing 1 reply thread
  • You must be logged in to reply to this topic.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .