Skip to content

Introduction to Cybersecurity Lecture 2

Concepts of Cybersecurity (part I)

The five core concepts of cybersecurity are:

  • Authentication
  • Authorization
  • Confidentiality
  • Integrity
  • Availability

Authentication vs. Authorization

ConceptAuthenticationAuthorization
DefinitionThe process of verifying the identity of users to grant access to the system.The process of validating a user's privileges or authorities to access specific resources.
ProcessUsers are verified.Users are validated.
OrderUsually done before authorization.Usually done after successful authentication.
RequirementRequires user's login details.Requires information about user's privileges or security levels.
PurposeDetermines whether the person is a valid user or not.Determines what permissions the user has within the system.
Information TransmissionGenerally uses an ID Token to transmit information.Generally uses an Access Token to transmit information.
ModificationAuthentication credentials can be changed by the user when needed.Authorization permissions are set by the system owner and cannot be changed by the user.
VisibilityAuthentication is visible to the user.Authorization is not visible to the user.
Identification MethodsUsername, password, face recognition, retina scan, fingerprints, etc.Access rights to resources based on predefined roles.
ExampleEmployees must authenticate via the network to access their company email.Once authenticated, the system determines what information the employees can access.
ProtocolOpenID Connect (OIDC) is commonly used for managing authentication.OAuth 2.0 is commonly used for managing authorization.
Popular TechniquesPassword-Based Authentication, Two-Factor Authentication (2FA), Multi-Factor Authentication (MFA), Single Sign-On (SSO), Social Authentication.Role-Based Access Controls (RBAC), JSON Web Token (JWT), SAML Authorization, OpenID, OAuth 2.0.