correct styling of content i.e. links to the bottom (#6152)

pull/6154/head
dsh 3 months ago committed by GitHub
parent 3cb0d45764
commit 504fcd8126
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
  1. 25
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/108-authentication-vs-authorization.md

@ -4,29 +4,24 @@ To ensure cybersecurity, it's essential to understand the differences between tw
## Authentication
**Authentication** is the process of validating the identity of a user, device, or system. It confirms that the entity attempting to access the resource is who or what they claim to be. The most common form of authentication is the use of usernames and passwords. Other methods include:
- [@article@Two-factor authentication (2FA)](https://authy.com/what-is-2fa/)
- [@article@Biometrics (fingerprint, facial recognition, etc.)](https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5428991/)
- [@article@Security tokens or certificates](https://www.comodo.com/e-commerce/ssl-certificates/certificate.php)
In simple terms, authentication answers the question, _"Who are you?"_
**Authentication** is the process of validating the identity of a user, device, or system. It confirms that the entity attempting to access the resource is who or what they claim to be. The most common form of authentication is the use of usernames and passwords. In simple terms, authentication answers the question, _"Who are you?"_
## Authorization
**Authorization** comes into play after the authentication process is complete. It involves granting or denying access to a resource, based on the authenticated user's privileges. Authorization determines what actions the authenticated user or entity is allowed to perform within a system or application.
For example, a basic user may be authorized to view and edit their personal data, while an administrator would have the authority to access and manage all user accounts within the same application.
For example, a basic user may be authorized to view and edit their personal data, while an administrator would have the authority to access and manage all user accounts within the same application. In a nutshell, authorization answers the question, _"What are you allowed to do?"_
## Conclusion
Authentication and authorization are critical components of a secure system. By understanding their distinct roles in the security process, you can better manage access to resources and protect sensitive data. Remember, authentication verifies the identity of a user, while authorization determines and enforces the actions and resources the user is permitted to access within a system or application.
Common methods of implementing authorization include:
Learn more from the following resources:
- [@article@Two-factor authentication (2FA)](https://authy.com/what-is-2fa/)
- [@article@Biometrics (fingerprint, facial recognition, etc.)](https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5428991/)
- [@article@Security tokens or certificates](https://www.comodo.com/e-commerce/ssl-certificates/certificate.php)
- [@article@Role-based access control (RBAC)](https://en.wikipedia.org/wiki/Role-based_access_control)
- [@article@Access Control Lists (ACLs)](https://en.wikipedia.org/wiki/Access-control_list)
- [@article@Attribute-based access control (ABAC)](https://en.wikipedia.org/wiki/Attribute-based_access_control)
- [@feed@Explore top posts about Authentication](https://app.daily.dev/tags/authentication?ref=roadmapsh)
In a nutshell, authorization answers the question, _"What are you allowed to do?"_
## Conclusion
Authentication and authorization are critical components of a secure system. By understanding their distinct roles in the security process, you can better manage access to resources and protect sensitive data. Remember, authentication verifies the identity of a user, while authorization determines and enforces the actions and resources the user is permitted to access within a system or application.

Loading…
Cancel
Save