From the course: CompTIA Cybersecurity Analyst (CySA+) (CS0-003) Cert Prep

Unlock the full course today

Join today to access over 24,200 courses taught by industry experts.

Usernames and access cards

Usernames and access cards

- Identification is one of the basic requirements of any access control system. Users must have a way to identify themselves uniquely to a system using technology that ensures that they will not be confused with any other user of the system. Let's talk about two common identification mechanisms, usernames and access cards. Usernames are by far the most common means of identification for digital systems. Organizations typically provide every individual who will access their computing systems with a unique identifier that they use across all systems. Commonly, usernames take the form of a first initial and last name, or a similar pattern, that makes it easy for someone seeing the username to identify the person who owns it. Now remember, usernames are for identification, not authentication, so there's no need to keep them secret. Obvious usernames make everyone's lives easier. Organizations also commonly use access card-based identification systems. Many organizations issue employee…

Contents