Changes

Security+ - Authentication and Identity Verification

4 bytes removed, 21:28, 1 February 2016
m
Text replacement - "<google>BUY_SECURITYPLUS</google>" to "<htmlet>securityplus</htmlet>"
<hr>
<googlehtmlet>BUY_SECURITYPLUSsecurityplus</googlehtmlet>
In the preceding chapter of [[Security+ Essentials]] we looked in detail at the various levels of access control used to govern access to system resources once a user has logged into a system. While access control provides a high level of control over what a user can do once they are on the system, it does nothing to prevent unauthorized users from logging onto the system in the first place. As mentioned previously, any comprehensive IT security strategy must consist of multiple layers of security. One of the cornerstones of a good strategy involves the use of authentication and identity verification. In this chapter the various methods of authentication will be covered.