Identification
Process where a user claims an identity to a system
e.g. Username, Email Address, SSN, etc.
Authentication
Process of verifying the identity of an user or system
Prevent unauthorized access, Protect user data & privacy, Resource validity
Factors to Verify Authenticity
Authorization
Defines what actions or resources a user can access
Protect sensitive data, Maintain system integrity, create streamlined user experience
Accounting
Acting of tracking user activity and resource usage typically for auditing or billing
Audit Trail, Compliance, Forensic Analysis, Resource Optimization, User Accountability
Logs Sources: Syslog Servers, Network Analyzers, SIEM
Non-repudiation
Undeniable proof that an specific action or event has taken place
Confirm authenticity, Ensure Integrity, Provide Accountability