When we provide access to our organization’s network, we use a model called IAAA (Identification, Authentication, Authorization, and Accounting/Auditing). A user first claims an identity with their username, authenticates by providing a password or PIN, is authorized to perform certain actions, and we record everything that user does. In this video we walk through the IAAA model and why it’s so important to cyber security.
CompTIA Security+ Study Guide: https://amzn.to/36egURI
DISCLAIMER: I am an ambassador or affiliate for many of the brands referenced. As an Amazon Associate, I earn a commission from qualifying purchases.