<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Please help me justify this question in CISSP Study Group</title>
    <link>https://community.isc2.org/t5/CISSP-Study-Group/Please-help-me-justify-this-question/m-p/73111#M1630</link>
    <description>&lt;P&gt;The book is correct and let me explain more about it.&lt;BR /&gt;Accountability for access control fundamentally relies on &lt;STRONG&gt;Identification&lt;/STRONG&gt; and &lt;STRONG&gt;Authentication&lt;/STRONG&gt;.&lt;BR /&gt;Here's the justification:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Identification&lt;/STRONG&gt;: This is the process of claiming an identity, typically by providing a username or ID. It’s the first step in ensuring that the correct individual is attempting to access a system or resource.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Authentication&lt;/STRONG&gt;: Once an identity is claimed, authentication is the process of verifying that the identity is valid. This is usually done through passwords, biometrics, or other verification methods.&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;For accountability in access control, it’s crucial to know &lt;EM&gt;who&lt;/EM&gt; is accessing the system (Identification) and to ensure that the person is who they claim to be (Authentication). Without these two factors, you cannot effectively hold individuals accountable for their actions within the system because you wouldn't be able to accurately track or verify their identity.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Authorization&lt;/STRONG&gt;, mentioned in other options, is the process of determining what resources an authenticated user is allowed to access, but it doesn't directly relate to accountability.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Accountability and authentication&lt;/STRONG&gt; (option D) suggests a circular reference, where accountability relies on authentication, but this misses the importance of identification.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I hope it is clear now. Thanks!&lt;/P&gt;</description>
    <pubDate>Thu, 15 Aug 2024 05:14:05 GMT</pubDate>
    <dc:creator>singhmanmeet</dc:creator>
    <dc:date>2024-08-15T05:14:05Z</dc:date>
    <item>
      <title>Please help me justify this question</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Please-help-me-justify-this-question/m-p/73107#M1629</link>
      <description>&lt;P&gt;&lt;SPAN&gt;What two important factors does accountability for access control rely on&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;A. Identification and authorization&lt;/P&gt;&lt;P&gt;B. Authentication and authorization&lt;/P&gt;&lt;P&gt;C. Identification and authentication&lt;/P&gt;&lt;P&gt;D. Accountability and authentication&lt;/P&gt;&lt;DIV class=""&gt;&lt;BR /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think the answer should be B, as accountability is related to authorization.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The book says it is C.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 15 Aug 2024 04:13:48 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Please-help-me-justify-this-question/m-p/73107#M1629</guid>
      <dc:creator>RontheCrypto</dc:creator>
      <dc:date>2024-08-15T04:13:48Z</dc:date>
    </item>
    <item>
      <title>Re: Please help me justify this question</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Please-help-me-justify-this-question/m-p/73111#M1630</link>
      <description>&lt;P&gt;The book is correct and let me explain more about it.&lt;BR /&gt;Accountability for access control fundamentally relies on &lt;STRONG&gt;Identification&lt;/STRONG&gt; and &lt;STRONG&gt;Authentication&lt;/STRONG&gt;.&lt;BR /&gt;Here's the justification:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Identification&lt;/STRONG&gt;: This is the process of claiming an identity, typically by providing a username or ID. It’s the first step in ensuring that the correct individual is attempting to access a system or resource.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Authentication&lt;/STRONG&gt;: Once an identity is claimed, authentication is the process of verifying that the identity is valid. This is usually done through passwords, biometrics, or other verification methods.&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;For accountability in access control, it’s crucial to know &lt;EM&gt;who&lt;/EM&gt; is accessing the system (Identification) and to ensure that the person is who they claim to be (Authentication). Without these two factors, you cannot effectively hold individuals accountable for their actions within the system because you wouldn't be able to accurately track or verify their identity.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Authorization&lt;/STRONG&gt;, mentioned in other options, is the process of determining what resources an authenticated user is allowed to access, but it doesn't directly relate to accountability.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Accountability and authentication&lt;/STRONG&gt; (option D) suggests a circular reference, where accountability relies on authentication, but this misses the importance of identification.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I hope it is clear now. Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 15 Aug 2024 05:14:05 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Please-help-me-justify-this-question/m-p/73111#M1630</guid>
      <dc:creator>singhmanmeet</dc:creator>
      <dc:date>2024-08-15T05:14:05Z</dc:date>
    </item>
    <item>
      <title>Re: Please help me justify this question</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Please-help-me-justify-this-question/m-p/73115#M1631</link>
      <description>&lt;P&gt;the correct answer is C, authorization is not the factor in which Accountability relies.&lt;/P&gt;&lt;P&gt;It's just identification and authentication&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Aug 2024 10:52:01 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Please-help-me-justify-this-question/m-p/73115#M1631</guid>
      <dc:creator>Roszan</dc:creator>
      <dc:date>2024-08-15T10:52:01Z</dc:date>
    </item>
    <item>
      <title>Re: Please help me justify this question</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Please-help-me-justify-this-question/m-p/73125#M1632</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1266076275"&gt;@RontheCrypto&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;&lt;SPAN&gt;What two important factors does accountability for access control rely on&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;A. Identification and authorization&lt;/P&gt;&lt;P&gt;B. Authentication and authorization&lt;/P&gt;&lt;P&gt;C. Identification and authentication&lt;/P&gt;&lt;P&gt;D. Accountability and authentication&lt;/P&gt;&lt;DIV class=""&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think the answer should be B, as accountability is related to authorization.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The book says it is C.&lt;/P&gt;&lt;/DIV&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;The oddity of C is that you can't have authentication without identification. I'm not really sure what they are trying to get at with this question, but it is incorrect to suggest an access control relies only on authentication.&amp;nbsp; If all a system does is track who or what accessed a resource but doesn't log authorization, then you don't have enough to confirm an access control is meeting its security objective. If an ATM logs that someone with your card and PIN attempted to access your savings account, but doesn't record whether the individual is over their daily withdrawal limit, then how will either the user or the bank know why the transaction failed? Maybe there is some hair-splitting that I am missing here, but I like your answer.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Aug 2024 14:48:36 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Please-help-me-justify-this-question/m-p/73125#M1632</guid>
      <dc:creator>JoePete</dc:creator>
      <dc:date>2024-08-15T14:48:36Z</dc:date>
    </item>
  </channel>
</rss>

