When it comes to access to network resources, there are a number of ways to make sure that only certain people are able to perform certain tasks. In this section, we will discuss the principles behind identification, authorization, and access control. We will also look at some of the practical methods that can be implemented to ensure the identity of the users on a system. This section will cover the following topics:
- Identification versus authentication
- Authentication (single factor) and authorization
- Multifactor authentication
- Biometrics
- Tokens
- Smart card
- The content below this message is for members only.