One of the first areas in IT security is giving someone access to the company's network to use resources for their job. Each person needs some form of identification so that they can prove who they are; it could be anything ranging from a username to a smart card. It needs to be unique so that the person using that identity is accountable for its use. The second part after proving your identity is to provide authentication for that identity; this can be done in many ways for example inserting a password or if you have a smart card it would be a PIN. The final part is authorization that provides access to data.
Understanding Identity and Access Management Concepts
Passwords
Passwords are one of the most common ways of...