You are viewing a free preview of this lesson.
Subscribe to unlock all 10 lessons in this course and every other course on LearningBro.
Authentication and access control are fundamental to keeping computer systems secure. Authentication verifies who you are; access control determines what you are allowed to do. This lesson covers the three factors of authentication, biometrics, two-factor authentication and access control principles.
Authentication is the process of verifying that a user or device is who they claim to be. Without authentication, anyone could access any system, and there would be no way to track who did what.
Authentication is based on one or more of three factors:
| Factor | Description | Examples |
|---|---|---|
| Something you know | Information only the user should know | Password, PIN, security question answer |
| Something you have | A physical object the user possesses | Smartphone (authenticator app), smart card, USB security key |
| Something you are | A biological characteristic unique to the user | Fingerprint, iris scan, facial recognition, voice pattern |
Passwords are the most common form of authentication — "something you know". However, passwords have well-known weaknesses:
Subscribe to continue reading
Get full access to this lesson and all 10 lessons in this course.