EBK MANAGEMENT OF INFORMATION SECURITY
6th Edition
ISBN: 9780357752869
Author: WHITMAN
Publisher: CENGAGE CO
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 12, Problem 1RQ
Explanation of Solution
Differences between authentication and authorization:
Authentication | Authorization |
It approves the individuality of the person who is accessing a physical or logical area. | It defines what activities a person can perform in a specific physical or logical area. |
It is the method of authenticating user authorizations to gain user access. | It is the method of authenticating whether access is permitted or not. |
It usually requires a username and a password. | It requires different authentication factors depending on the security level. |
It is the first step of authorization so always comes first. | It is done after successful authentication. |
Explanation of Solution
Reason:
A system cannot permit authorization without authentication because first the system wants to identify the person’s identity in order to identify what authorization level the person possesses.
Want to see more full solutions like this?
Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
What distinguishes authentication from authorization? Certain
systems can be authorized without authentication. Why or why not?
What distinguishes authentication from authorization? Certain systems can authorize without authentication. Why or why not?
Which objectives does authentication seek to accomplish? Methods of verification are assessed with regard to their benefits and drawbacks.
Chapter 12 Solutions
EBK MANAGEMENT OF INFORMATION SECURITY
Ch. 12 - Prob. 1RQCh. 12 - Prob. 2RQCh. 12 - Prob. 3RQCh. 12 - Prob. 4RQCh. 12 - Prob. 5RQCh. 12 - Prob. 6RQCh. 12 - Prob. 7RQCh. 12 - Prob. 8RQCh. 12 - Prob. 9RQCh. 12 - Prob. 10RQ
Ch. 12 - Prob. 11RQCh. 12 - Prob. 12RQCh. 12 - Prob. 13RQCh. 12 - Prob. 14RQCh. 12 - Prob. 15RQCh. 12 - Prob. 16RQCh. 12 - Prob. 17RQCh. 12 - Prob. 18RQCh. 12 - Prob. 19RQCh. 12 - Prob. 20RQCh. 12 - Prob. 2ECh. 12 - Prob. 3ECh. 12 - Prob. 4ECh. 12 - Prob. 5ECh. 12 - Prob. 1DQCh. 12 - Prob. 2DQCh. 12 - Prob. 3DQCh. 12 - Prob. 4DQ
Knowledge Booster
Similar questions
- What are the benefits and downsides of various forms of authentication in terms of security?arrow_forwardIs there a specific purpose for authentication? Which authentication methods offer the biggest advantages and disadvantages?arrow_forwardDoes authentication serve a unique purpose? What are the best and worst aspects of the various authentication methods?arrow_forward
- Explain the concept of a challenge–response system in terms of authentication. How is it more secure than a traditional password-based system?arrow_forwardHow are authorization and authentication similar and different from one another. What, if any, relationship do the two of them have to one another?arrow_forwardWhat aims does the authentication procedure serve? Differentiate the benefits and drawbacks of different authentication techniques.arrow_forward
- Define "authentication challenge–response system." Why is this approach safer than password-based ones?arrow_forwardExplain the practical use of a challenge-response authentication system.How does it make a system that needs a password to access it any less secure?arrow_forwardAuthentication is put to use for a wide range of reasons; what are some of the more typical examples? How do the various methods of authentication stack up against one another in terms of the benefits and drawbacks that come along with the use of each individual method?arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Systems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning