Security+ SY0-601 Notes and Resources

Documentation for Sec+ SY0-601 learning materials and notes.

Back to Home | Back to Domain Two

Subdomain 2.4

Summarize authentication and authorization design concepts.

Terms: 35


Authentication Methods

The process of verifying the identity of a user, device, or system. It is a crucial component of information security that helps prevent unauthorized access to sensitive data and resources.

Directory Services

Federation

Attestation
Technologies

During the authentication process, we use many different technologies such as TOTP, HOTP, SMS, static codes, push notifications and more.

Time-Based One-Time Password (TOTP)
HMAC-Based One-Time Password (HOTP)
Short Message Service (SMS)
Token Key
Static Codes
Authentication Applications
Push Notifications
Phone Call
Smart Card Authentication

Biometrics

“Life measurement” used for security purposes.

Fingerprint
Retina
Iris
Facial
Voice
Vein
Gait Analysis
Efficacy Rates
False Acceptance
False Rejection
Crossover Error Rate

Multifactor Authentication (MFA) Factors and Attributes

Factors

Something you know, something you have, something you are.

Something You Know
Something You Have
Something You Are
Attributes

Something you are, something you can do, something you can exhibit, someone you know.

Somewhere You Are
Something You Can Do
Something You Exhibit
Someone You Know

Authentication, Authorization, and Accounting (AAA)

Cloud Vs. On-Premises Requirements


Demonstrate Your Understanding

Back to Top | Study in a New Tab

Click or tap on ‘Choose a Study Mode’ to switch between flash cards, match, learn, test and more.