Identification and Authentication Flashcards
1
Q
Users must be identified to enable
A
- user-specific access controls
- individual accountability for their actions
2
Q
Claimed identities must be authenticated
A
- First line of defence for the system
- Safeguards against unauthorised use (internal and external)
- Traditional Passwords are the most common means of
authentication in digital systems - Pro - Conceptually simple for designers and users and can
provide good protection if used correctly - Con - Protection is often compromised by users