SlideShare a Scribd company logo
2
Most read
3
Most read
4
Most read
Authentication VS Authorization
Frank H. Vianzon, Adjunct
Instructor, GPEN, GCWN, CCNA, MCS
E
Authentication
• Authentication is the process of submitting and checking
credentials to validate or prove user identity. Authentication
is used in access control to allow only specific individuals
access to a building or computer system. The process of
authentication typically starts by providing a username
along with one or more of the following credentials:
*Authorization
Authorization, by contrast, is the mechanism by which a
system determines what level of access a particular
authenticated user should have to secured resources
controlled by the system
•

As an instructor, I can look at your grades for my class. I
posted them

• Can I look at the grades for your English class??
Back to Authentication!
•

Usernames are not case sensitive, Passwords are

•

Password Policy settings in the Local Security Policy control
characteristics about a password such as how long it must be, how
often it must be changed, or whether complex passwords are
required.

•

Account Lockout Policy settings in the Local Security Policy control
what happens when users enter incorrect passwords. With account
lockout, an account is locked (and cannot be used for logon) when a
specified number of incorrect passwords are entered.
– Depending on the policy settings, locked accounts might be unlocked
automatically after a period of time.
– You can unlock a locked account by editing the account properties in Local
Users and Groups.
– If an account is locked because the user forgot the password, an
administrator can change the password using Local Users and Groups. As a
best practice when changing the password for a user, the password the
administrator configures should be a temporary password. In the user
account properties, select the User must change password at next
logon option to require the user to change the password after logging on
with the temporary password.
Authentication
• A disabled account cannot be used for logon.
– You will typically disable an account that is no longer needed
or that will not be used for a long period of time.
– You can manually disable and enable an account; however, you
cannot manually lock an account (you can only unlock a locked
account). Accounts are locked automatically through the
account lockout settings.

• When accessing shared folders or Remote Desktop on a
network computer, the user account must have been
configured with a password. User accounts with blank
passwords cannot be used to gain network access to a
computer (configure a password first, then try to
reconnect).
Three Factors
• Something You Know
– Passwords

• Something You Have
– Tokens
– Smartcards

• Something You Are
– Biometrics
Authentication Methods
• Password (vs Passphrase)
– How many characters can your Windows
password be?
– Which is harder to crack? A complex
password or a long passphrase?
•

http://www.sans.org/windows-security/2009/06/12/how-long-tocrack-a-password-spreadsheet/

• Smart Card
• Biometric
– What are the problems with biometrics?

More Related Content

PDF
Cyber security and demonstration of security tools
PPTX
cyber security presentation.pptx
PPT
Software security
PDF
Authentication and authorization
PPTX
Authentication
PPTX
Authentication(pswrd,token,certificate,biometric)
PDF
Malware classification and detection
PPTX
Introduction to Malware Analysis
Cyber security and demonstration of security tools
cyber security presentation.pptx
Software security
Authentication and authorization
Authentication
Authentication(pswrd,token,certificate,biometric)
Malware classification and detection
Introduction to Malware Analysis

What's hot (20)

PPTX
User authentication
 
PPT
Information Security Principles - Access Control
PDF
5. Identity and Access Management
PDF
Web Application Security 101
PDF
Application Security - Your Success Depends on it
PPTX
Secure coding practices
ODP
Secure coding in C#
PPTX
Basics of Denial of Service Attacks
PDF
Penetration testing & Ethical Hacking
PPT
Email Security : PGP & SMIME
PDF
Cyber Security Vulnerabilities
PPTX
OWASP Top 10 2021 Presentation (Jul 2022)
PPTX
Footprinting and reconnaissance
PPTX
Cyber Security Awareness Program.pptx
PPTX
Introduction to Cybersecurity Fundamentals
PDF
Introduction to Software Security and Best Practices
PPTX
Password Cracking
PPTX
x.509-Directory Authentication Service
ODP
Email security
User authentication
 
Information Security Principles - Access Control
5. Identity and Access Management
Web Application Security 101
Application Security - Your Success Depends on it
Secure coding practices
Secure coding in C#
Basics of Denial of Service Attacks
Penetration testing & Ethical Hacking
Email Security : PGP & SMIME
Cyber Security Vulnerabilities
OWASP Top 10 2021 Presentation (Jul 2022)
Footprinting and reconnaissance
Cyber Security Awareness Program.pptx
Introduction to Cybersecurity Fundamentals
Introduction to Software Security and Best Practices
Password Cracking
x.509-Directory Authentication Service
Email security
Ad

Viewers also liked (20)

PPTX
Authentication and Authorization in Asp.Net
PPTX
Authentication, authorization, accounting(aaa) slides
PDF
Authentication and Authorization Architecture in the MEAN Stack
PDF
Difference between authentication and authorization in asp.net
PDF
Access Control Presentation
PPT
Web Servers (ppt)
PPTX
Introduction to mvc architecture
PPTX
Windows PowerShell
PDF
A Scalable Client Authentication & Authorization Service for Container-Based ...
PPT
PowerShell Technical Overview
PPT
8. operations security
PPTX
Powershell Demo Presentation
PDF
JavaOne 2014 - Securing RESTful Resources with OAuth2
PPTX
Data security authorization and access control
PPT
Soft Computing
PPT
Accountability in schools
PPTX
Introduction To Windows Power Shell
PPT
Administrative Accountability
PPTX
An Introduction to OAuth 2
PPTX
System protection in Operating System
Authentication and Authorization in Asp.Net
Authentication, authorization, accounting(aaa) slides
Authentication and Authorization Architecture in the MEAN Stack
Difference between authentication and authorization in asp.net
Access Control Presentation
Web Servers (ppt)
Introduction to mvc architecture
Windows PowerShell
A Scalable Client Authentication & Authorization Service for Container-Based ...
PowerShell Technical Overview
8. operations security
Powershell Demo Presentation
JavaOne 2014 - Securing RESTful Resources with OAuth2
Data security authorization and access control
Soft Computing
Accountability in schools
Introduction To Windows Power Shell
Administrative Accountability
An Introduction to OAuth 2
System protection in Operating System
Ad

Similar to Authentication vs authorization (20)

PDF
PDF
Two-factor authentication- A sample writing _Zaman
PDF
Class paper final
PPTX
Introduccion a la seguridad Windows 7
PPTX
501 ch 2 understanding iam
PPT
Electronic Authentication, More Than Just a Password
DOCX
CHAPTER 7 Authentication and Authorization On
PPT
Marcos de Pedro Neoris authenware_cybersecurity step1
PPT
educational content,educational content,educational content,
PPTX
Desktop security
PDF
information security Lecture by cyber security
PDF
Implementing Account Policies & Authorization Solutions
PDF
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
PPTX
COMPUTER-AUTfejenfejejeeejejfejnejHENpptx
PPTX
009 Authentication and Access Control.pptx
PPT
Ch07 Access Control Fundamentals
PDF
The Business Case for Account Lockout Management
PPTX
Cyber security
PDF
Two factor authentication
Two-factor authentication- A sample writing _Zaman
Class paper final
Introduccion a la seguridad Windows 7
501 ch 2 understanding iam
Electronic Authentication, More Than Just a Password
CHAPTER 7 Authentication and Authorization On
Marcos de Pedro Neoris authenware_cybersecurity step1
educational content,educational content,educational content,
Desktop security
information security Lecture by cyber security
Implementing Account Policies & Authorization Solutions
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
COMPUTER-AUTfejenfejejeeejejfejnejHENpptx
009 Authentication and Access Control.pptx
Ch07 Access Control Fundamentals
The Business Case for Account Lockout Management
Cyber security
Two factor authentication

More from Frank Victory (12)

PPTX
Container security Familiar problems in new technology
PDF
Kealy OWASP interactive_artifacts
PPTX
Automation and open source turning the tide on the attackers
PPTX
CNG 256 cloud computing
PPTX
CNG 256 wireless wi-fi and bluetooth
PDF
Differential learning SnowFROC 2017
POTX
Phishing Forensics - SnowFROC - Denver Chapter of OWASP
PPTX
Active defensecombo clean
PPTX
Dns security threats and solutions
PPTX
Cng 125 – chapter 12 network policies
PPTX
9.0 security (2)
PPTX
Lesson 6 web based attacks
Container security Familiar problems in new technology
Kealy OWASP interactive_artifacts
Automation and open source turning the tide on the attackers
CNG 256 cloud computing
CNG 256 wireless wi-fi and bluetooth
Differential learning SnowFROC 2017
Phishing Forensics - SnowFROC - Denver Chapter of OWASP
Active defensecombo clean
Dns security threats and solutions
Cng 125 – chapter 12 network policies
9.0 security (2)
Lesson 6 web based attacks

Recently uploaded (20)

PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Approach and Philosophy of On baking technology
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Spectroscopy.pptx food analysis technology
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Big Data Technologies - Introduction.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Empathic Computing: Creating Shared Understanding
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Understanding_Digital_Forensics_Presentation.pptx
Programs and apps: productivity, graphics, security and other tools
Reach Out and Touch Someone: Haptics and Empathic Computing
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Building Integrated photovoltaic BIPV_UPV.pdf
Approach and Philosophy of On baking technology
“AI and Expert System Decision Support & Business Intelligence Systems”
20250228 LYD VKU AI Blended-Learning.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Spectroscopy.pptx food analysis technology
Per capita expenditure prediction using model stacking based on satellite ima...
Spectral efficient network and resource selection model in 5G networks
MIND Revenue Release Quarter 2 2025 Press Release
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf

Authentication vs authorization

  • 1. Authentication VS Authorization Frank H. Vianzon, Adjunct Instructor, GPEN, GCWN, CCNA, MCS E
  • 2. Authentication • Authentication is the process of submitting and checking credentials to validate or prove user identity. Authentication is used in access control to allow only specific individuals access to a building or computer system. The process of authentication typically starts by providing a username along with one or more of the following credentials:
  • 3. *Authorization Authorization, by contrast, is the mechanism by which a system determines what level of access a particular authenticated user should have to secured resources controlled by the system • As an instructor, I can look at your grades for my class. I posted them • Can I look at the grades for your English class??
  • 4. Back to Authentication! • Usernames are not case sensitive, Passwords are • Password Policy settings in the Local Security Policy control characteristics about a password such as how long it must be, how often it must be changed, or whether complex passwords are required. • Account Lockout Policy settings in the Local Security Policy control what happens when users enter incorrect passwords. With account lockout, an account is locked (and cannot be used for logon) when a specified number of incorrect passwords are entered. – Depending on the policy settings, locked accounts might be unlocked automatically after a period of time. – You can unlock a locked account by editing the account properties in Local Users and Groups. – If an account is locked because the user forgot the password, an administrator can change the password using Local Users and Groups. As a best practice when changing the password for a user, the password the administrator configures should be a temporary password. In the user account properties, select the User must change password at next logon option to require the user to change the password after logging on with the temporary password.
  • 5. Authentication • A disabled account cannot be used for logon. – You will typically disable an account that is no longer needed or that will not be used for a long period of time. – You can manually disable and enable an account; however, you cannot manually lock an account (you can only unlock a locked account). Accounts are locked automatically through the account lockout settings. • When accessing shared folders or Remote Desktop on a network computer, the user account must have been configured with a password. User accounts with blank passwords cannot be used to gain network access to a computer (configure a password first, then try to reconnect).
  • 6. Three Factors • Something You Know – Passwords • Something You Have – Tokens – Smartcards • Something You Are – Biometrics
  • 7. Authentication Methods • Password (vs Passphrase) – How many characters can your Windows password be? – Which is harder to crack? A complex password or a long passphrase? • http://www.sans.org/windows-security/2009/06/12/how-long-tocrack-a-password-spreadsheet/ • Smart Card • Biometric – What are the problems with biometrics?