security

Security

Ability to reasonably guard against completing or altering tasks as unauthorised users or prevent authorised users from doing so

Auth

Authentication vs Authorisation: Confirming users are who they say they are and assigning what users can do and access

MAC/DAC/RBAC

For authentication and authorisation, logical access control can be mandatory, discretionary or role-based

MFA

Authentication via multiple method types of knowledge, possession (token) and inherence (biometric) where needed