Security+ Chapter 2 Basic Vocab
To Access resources based on their proven identity.
Methods to track user activity and record the activity in longs.
Allows security professionals to recreate the events that preceded a security incident.
Occurs when a user claims an identity such as with a username or email address.