Page 73 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 73

FIGURE 1.2 The five elements of AAA services


               Identification

               Identification is the process by which a subject professes an identity
               and accountability is initiated. A subject must provide an identity to a
               system to start the process of authentication, authorization, and
               accountability (AAA). Providing an identity can involve typing in a
               username; swiping a smart card; waving a proximity device; speaking

               a phrase; or positioning your face, hand, or finger for a camera or
               scanning device. Providing a process ID number also represents the
               identification process. Without an identity, a system has no way to
               correlate an authentication factor with the subject.

               Once a subject has been identified (that is, once the subject’s identity
               has been recognized and verified), the identity is accountable for any
               further actions by that subject. IT systems track activity by identities,

               not by the subjects themselves. A computer doesn’t know one human
               from another, but it does know that your user account is different from
               all other user accounts. A subject’s identity is typically labeled as, or
               considered to be, public information. However, simply claiming an
               identity does not imply access or authority. The identity must be
               proven (authentication) or verified (ensuring nonrepudiation) before

               access to controlled resources is allowed (verifying authorization).
   68   69   70   71   72   73   74   75   76   77   78