Write up #1 Differing authentication and authorization

BLUF
Authentication and authorization may seem the same, but they are completely different.

What is authentication?
What is authentication? From the general aspect of authentication is an action proven to show that something or someone is true, genuine, or has validity to itself. But from the technological standpoint, authentication is a process of validating the identity of a registered processor, and user to enable access to protected systems and networks etc. So, for example, in the passage, “What is the CIA triad” under “confidentiality” user IDs and passwords constitute a standard procedure called two-factor authentication it also states “that it is becoming a norm for security tokens and Key fobs in addition to users taking precautions to minimize transmitted required transactions”.

What is Authorization?
Now what is authorization? These two may seem the same but they are completely different. Authorization is a whole Other process of giving someone or something the ability to have access to reliable sources Authorization can help those apply concepts to computer systems and a prime example of authorization is security systems. Another example under “confidentiality, integrity, and availability” It states confidentiality is equivalent to privacy, and it is designed to prevent unauthorized access times to certain data that is categorized because it falls into the wrong hands. More or less strategic measures can be informative affecting many. It also means that information can be constantly accessed from authorized parties if authorizations are not up-to-date and then checked. These checks are used to train and help familiarize authorized people with risk factors, and how to guard against intruders. For example, most authorizations include strong passwords that are specific designated questions are only apply to you and no one else will know the answer to authorize and give you access to whatever threshold or system you are accessing

Concluding statement
To conclude my write-up Authentication in authorization may seem similar, but the power given within both of them holds many different values. It is up to us to decide who we give that power to.

References
Chai, W. 2022 What is the CIA Triad? Definition, Explanation, Examples

Leave a Reply

Your email address will not be published. Required fields are marked *