Identification: The process of asserting a unique identifier, such as a username, to represent an individual, system, or process within a system. It serves as the initial step in the access control process, preceding authentication, which validates the claimed identity. Accurate identification is crucial for protecting resources from unauthorized access.
Categories: CC D1: Security Principles | CCSP D5: Cloud Security Operations | CISM D3: Information Security Program | CISSP D5: Identity and Access Management (IAM) | Security+ D1: General Security Concepts | SSCP D2: Access Controls
Related Articles:
- Frequently Asked Questions FAQ CISSP, CISM, CC | ThorTeaches.com FAQGet answers to Frequently Asked Questions for your CISSP, CISM, & CC study. Learn how to study right, materials to use, tips and tricks, sales, and much more | ThorTeaches.com
- Glossary: Smart cards
- Glossary: Secure Cryptoprocessors
- Glossary: Risk analysis
- Glossary: Risk identification
- Glossary: Risk management
- Glossary: Radio Frequency Identification (RFID)
- Glossary: Personal Identification Number (PIN)
- Glossary: Personal Identification Verification Card
- Glossary: Physical access token