A.5. Authentication Schemes

No matter which access control scheme you use (DAC, MAC, and so forth), the basic two-step process to log onto the network is always required. Every authorized user has (or should have) their own user account. To use the IT system, the user must first log on. The two-step logon process is to claim an identity (identification) and then prove that you are responsible for that identity (authentication). There are at least three important aspects to this two-step process that require investigation.

  • Number and type of factors

  • Client, server, or mutual authentication

  • Mechanism of authentication protection

A.5.1. Authentication Factors

The number and type of factors reflect the strength of the authentication process. Remember ...

Get CompTIA Security+™ Deluxe: Study Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.