Changes

Security+ - Authentication and Identity Verification

1 byte removed, 19:30, 3 March 2008
no edit summary
In the preceding chapter of [[Security+ Essentials]] we looked in detail at the various levels of access control used to govern access to system resources once a user has logged into a system. While access control provides a high level of control over what a user can do once they are on the system, it does nothing to prevent unauthorized users from logging onto the system in the first place. As mentioned previously, any comprehensive IST IT security strategy must consist of multiple layers of security. One of the cornerstones of a good strategy involves the use of authentication and identity verification. In this chapter the various methods of authentication will be covered.
== What is Authentication? ==