Industry-relevant training in Business, Technology, and Design to help professionals and graduates upskill for real-world careers.
Fun, engaging games to boost memory, math fluency, typing speed, and English skills—perfect for learners of all ages.
The chapter discusses the critical role of authentication and authorization in securing digital systems, emphasizing the necessity of strong authentication methods and the distinct yet complementary nature of authentication and authorization processes. It explores various access control models, including Discretionary Access Control (DAC), Mandatory Access Control (MAC), and Role-Based Access Control (RBAC), while also addressing the concept of privilege and the risks associated with privilege escalation in cybersecurity.
References
Untitled document (20).pdfClass Notes
Memorization
What we have learnt
Final Test
Revision Tests
Term: Authentication
Definition: The process of verifying the claimed identity of a user, process, or device.
Term: Authorization
Definition: The process of determining what an authenticated subject is allowed to do or access.
Term: MultiFactor Authentication (MFA)
Definition: A security system that requires more than one form of verification to access a resource.
Term: Privilege Escalation
Definition: A type of cyberattack where an attacker gains unauthorized access to higher privilege levels than their current account possesses.
Term: Discretionary Access Control (DAC)
Definition: A type of access control where the owner of a resource defines permissions for other users.
Term: Mandatory Access Control (MAC)
Definition: A strict enforcement of access policies by a central authority based on predefined security labels.
Term: RoleBased Access Control (RBAC)
Definition: An access control model that assigns permissions to roles rather than directly to individual users, simplifying permission management.