Access Millions of academic & study documents

Manage Identification & Authentication Worksheet

Content type
User Generated
Subject
Computer Science
Type
Worksheet
Showing Page:
1/4

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/4

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/4

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 4 pages?
Access Now
Unformatted Attachment Preview
Filename: isc2-sscp-2019-2-2-1-manage-identification-and-authentication Show Name: SSCP 2019 Topic Name: Access Controls Episode Name: Manage Identification & Authentication Description: Adam and Wes discuss how to implement and maintain authentication methods, how to support internetwork trust architectures, the steps necessary to participate in the identity management lifecycle, and the how and why of implementing access controls. Access Controls Domain: Access Controls Manage identification and authentication of people, devices, and services 1. 2. 3. 4. 5. 6. 7. Identity management implementation Single/multi-factor authentication Accountability Session management Registration and proofing of identity Federated Identity Management (FIM) Credential management systems Access control - any hardware, software, policy or procedure attempting to control access to a resource Subject - User / thing that is requesting access to data Object - Data Access Control Lifecycle: a. Identification - subject claiming an identity (provides uniqueness) b. Authentication - verifies / validates identity of subject through comparison of factor(s) provided (provides validity) c. Authorization - subj ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4