Identification

Process where a user claims an identity to a system
e.g. Username, Email Address, SSN, etc.

Authentication

Process of verifying the identity of an user or system
Prevent unauthorized access, Protect user data & privacy, Resource validity

Factors to Verify Authenticity

Authorization

Defines what actions or resources a user can access
Protect sensitive data, Maintain system integrity, create streamlined user experience

Access Control Models

Accounting

Acting of tracking user activity and resource usage typically for auditing or billing
Audit Trail, Compliance, Forensic Analysis, Resource Optimization, User Accountability
Logs Sources: Syslog Servers, Network Analyzers, SIEM

Non-repudiation

Undeniable proof that an specific action or event has taken place
Confirm authenticity, Ensure Integrity, Provide Accountability