Lesson 4: Types of Authentication and Access Control

Authentication Authentication is defined as proving who you are claiming to be. By default, we have 3 types of authentication: Something that you know – A form of authentication coming from what you know (residing in the mind) Ex. Password, pin Something that you have – A form of authentication that is tangible. Ex. Token,… Read More Lesson 4: Types of Authentication and Access Control

Lesson 2: CIA, Triad, Formula for Protection, Least Privilege

The CIA Triad All issues and solutions pertaining to security fall under 3 categories: Confidentiality – Protection against unauthorized access Integrity – Protection against unauthorized modification Availability – Protection against denial of service See the following events and solutions: Locking the door when you leave the house – This is a confidentiality solution because only… Read More Lesson 2: CIA, Triad, Formula for Protection, Least Privilege

Lesson 1: Introduction to Information Security

Information Security (Infosec) is relatively a new discipline in Information Technology (IT). Usually, it is included as an elective in a course or just a section in software development or network administration. But in these modern times, the study of Infosec encompasses various domains in IT and industries. Meaning to say, Infosec can be applied… Read More Lesson 1: Introduction to Information Security