Cyber Security Fundamentals: Identification and AAA (CISSP & Security+)

When we provide access to our organization’s network, we use a model called IAAA (Identification, Authentication, Authorization, and Accounting/Auditing). A user first claims an identity with their username, authenticates by providing a password or PIN, is authorized to perform certain actions, and we record everything that user does. In this video we walk through the IAAA model and why it’s so important to cyber security.

CISSP Resources
Official CISSP CBK: https://amzn.to/2THCPhy
Official CISSP Study Guide: https://amzn.to/369BT7Z
Eleventh Hour CISSP: https://amzn.to/2Rfavl4

Security+ Resources
CompTIA Security+ Study Guide: https://amzn.to/36egURI

DISCLAIMER: I am an ambassador or affiliate for many of the brands referenced. As an Amazon Associate, I earn a commission from qualifying purchases.