Cybersecurity

0:00
Elearning
18
0

Description

Cybersecurity Explainer

Vocal Characteristics

Language

English

Voice Age

Young Adult (18-35)

Accents

North American (US General American - GenAM) North American (US South)

Transcript

Note: Transcripts are generated using speech recognition software and may contain errors.
Cyber security requires the ability to limit access based on a person or device's identity, secure authentication and being confident that you can reliably and correctly identify a user and device is the first step in enforcing robust access control authentication can be split into two parts. The first is identification. The object reveals its identity. When a person logs into the network, they are likely prompted for a user name. The system trust that this is their identity even without proof. The second part of authentication is verification. The object must prove that they are who they claim to be. For example, after a person enters their user name, the system might prompt them to enter a password authorization based on identity determines what resources the user can read, modify or delete correctly, identifying users and computers allows security systems to implement access control and authorization methods. Cyber security requires the ability to limit access based on the person or device's identity, secure authentication and being confident that you can reliably and correctly identify a user and device is the first step in enforcing robust access control authentication can be split into two parts. The first is identification, the object reveals its identity. When a person logs into the network, they are likely prompted for a user name. The system trusts that this is their identity, even without proof. The second part of authentication is verification. The object must prove that they are who they claim to be. For example, after a person enters their user name, the system might prompt them to enter a password authorization. Based on identity determines what resources the user can read, modify or delete correctly, identifying users. And computers allow security systems to implement access control and authorization methods.