Introduction To Security
Introduction To Security
1 Passwords 2 Biometrics
Passwords are the most common method of Biometric authentication uses unique
authentication. They require users to prove biological features such as fingerprints, iris
their identity by entering a unique combination patterns, or facial recognition to verify identity,
of characters. providing strong security.
Permissions define what actions (read, write, ACLs are lists of permissions attached to an object
execute) are allowed on a resource for different users that specify which users or system processes are
or groups, providing granular control over access. granted access rights to the object.
User Accounts
User Authentication Account Management
User authentication verifies the identity of a user Account management includes the creation,
attempting to access a system, typically through a deletion, and modification of user accounts,
username and password. ensuring proper control and oversight of system
access.
Encryption
Encryption converts data into a code, preventing unauthorized access to the data and
ensuring confidentiality.
Network Security