Monday, February 2, 2026

Week 7

 




Role of authentication in access control



Authentication is basically the “ID check” part of access control. Before a system decides what you’re allowed to do, it needs to make sure you are who you say you are.

Think of it like this: when you enter a building, the security guard asks for your ID. That’s authentication. Once they know it’s really you, they check what rooms you’re allowed to go into — that’s access control.

In computers and networks, authentication can be:

Passwords or PINs – something you know

Biometrics – something you are (like a fingerprint or face scan)

Tokens or smart cards – something you have

Without authentication, access control can’t work properly, because the system wouldn’t know which permissions to give you.

Week 6





Cloud Security Tips to Reduce Risks, Threats, and Vulnerabilities



    One of the best ways to reduce cloud security risks is by using strong identity and access management. This means using multi-factor authentication, strong passwords, and only giving users access to what they actually need. Doing this helps prevent unauthorized access and lowers the chances of accounts being compromised.

    Another important step is avoiding misconfigurations, which are one of the most common causes of cloud security issues. Regularly reviewing cloud settings, keeping systems updated, and using security tools to scan for mistakes can help catch problems early. This makes it easier to fix issues before they turn into serious risks.

    Protecting data is also a big part of cloud security. Sensitive data should always be encrypted, and tools like data loss prevention (DLP) can help stop accidental data sharing. On top of that, continuous monitoring and user security training help organizations stay aware of threats and reduce human error over time.

Week 7

  Role of authentication in access control Authentication is basically the “ID check” part of access control. Before a system decides what ...