Cybersecurity: Identification, Authentication, Authorization, Auditing, Accountability, And Non-repudiation
Preparing for CISSP, CISM, CRISC, CISA, CompTIA, CCSP, CCSK, here is what you need to know.
If you are preparing for CISSP, CISM, CRISC, CISA, CompTIA, CCSP, CCSK, or any other cybersecurity certification, understanding the basics and knowing about identification, authentication, authorization, auditing, accountability, and non-repudiation, will go long way. Trying to explain these terms in easy-to-understand language and with simple examples from the notes.
Identification
Definition: Identification is the ability to uniquely identify a user (or a system or an application or a process)
Explanation: It’s about “Professing an identity.” Identification occurs when a subject claims an identity, for example, when I say, “My name is Rajesh”
- A user can claim his identity by “Username or User ID”
- A process can claim its identity by “Process ID”
- An application can claim its identity by…