More from the book I'm reading... the CIA triad:
- confidentiality – let only the authorized see the private
- integrity – guard against inappropriate edits/deletes ensuring data stays valid (nonrepudiation)
- availability – uptime for access
Authentication can be based on three different factors (and if you require two of the three then you have two-factor authentication).
- knowledge – you must recall a password
- ownership – you have a token or a certificate
- inherence – validation based on something uniquely of you such as your DNA or a fingerprint (not inheritance but inherence)
Two-factor authentication acronyms:
- TFA
- 2FA
No comments:
Post a Comment