Please enable JavaScript.
Coggle requires JavaScript to display documents.
IDENTITY & ACCESS MANAGEMENT (IAM), Intext Citation - Coggle Diagram
IDENTITY & ACCESS MANAGEMENT (IAM)
IDENTIFICATION
IDENTITY ENROLLMENT
Types
SELF
MANUAL
AUTOMATED
Token Based
Goal of Identity Enrollment
Considerations for Identity Enrollment Sachems
Importance of Identification
Identity Management
Establishing Identity
System Identity
Trust Between Systems
Identity and Trust
Authentication
Authentication Factors
Single Factor Authentication
Multi Factor Authentication
Creating and Maintaining Authentication Records
Authorization
Role-Bases Priviledges
Role Bases Authroization
Vulnerabilities and Attacks
Password Vulnerabilities
Cracking Passwords
BruteForce Attacks on Passwords
Intext Citation
What is Identity Access Management (IAM)? | Microsoft Security. (n.d.).
https://www.microsoft.com/en-us/security/business/security-101/what-is-identity-access-management-iam
Barney, N., Shacklett, M. E., & Rosencrance, L. (2023, November 1). authentication. Security.
https://www.techtarget.com/searchsecurity/definition/authentication
What is Identity Security? - A Comprehensive Guide 101. (2024, April 3). SentinelOne.
https://www.sentinelone.com/cybersecurity-101/identity-security-what-it-is-why-its-so-important/
What is Authorization? - Examples and definition - Auth0. (n.d.). Auth0.
https://auth0.com/intro-to-iam/what-is-authorization
CrowdStrike. (2024, January 22). 7 Types of Identity-Based Attacks – CrowdStrike. crowdstrike.com.
https://www.crowdstrike.com/cybersecurity-101/identity-security/identity-based-attacks/