A-Z Popular Blog Security Search »
Information Security
 Advertisements
Related Guides

Identification vs Authentication

 , updated on
Identification is when someone identifies themselves. For example, entering your user id in a logon form is identification.
Authentication is when a system or process verifies identification.

Identification vs Authentication

Consider employee identification cards. Wearing a photo id with your name on it is an act of identification. As you walk around the office, people can see that you are claiming to belong to the organization.
Scanning your employee identification card at the entrance to the office and entering a password is an example of authentication. The system verifies your identification by confirming the validity of the id and password. Such authentication systems might also require a fingerprint scan.
Identification vs Authentication
Identification
Authentication
Definition
The act of formally identifying yourself.
Verifying identity.

Information Security

This is the complete list of articles we have written about information security.
Audit Trail
Canary Trap
Confidential Information
Critical Infrastructure
Cryptographic Keys
Cryptographic Salt
Cryptography
Cybersecurity Risk
Data Breach
Data Remanence
Data Room
Data Security
Deep Magic
Defense In Depth
Degaussing
Digital Identity
Failure Of Imagination
Geofencing
Hardening
Honeypot
Incident Response
IoT Security
Key Stretching
Network Security
Non-repudiation
Nonce
Operations Security
Overlay Network
Password Entropy
Password Fatigue
Proof Of Work
Sandbox
Secure Code Review
Security As A Service
Security Controls
Zero-day
More ...
If you enjoyed this page, please consider bookmarking Simplicable.
 

Authentication

A list of authentication techniques and considerations.

Password Entropy

An overview of password entropy.

Authentication vs Authorization

A few examples of the difference between authentication and authorization.

Security vs Privacy

The relationship between security and privacy.

Hardening

An overview of technology hardening.

Deep Magic

An overview of deep magic, a technology term.

Defense In Depth

An overview of defense In depth.

Encryption Examples

A definition of encryption with examples.

Canary Trap

A definition of canary trap with an example.

Honeypot

A definition of honeypot with examples.

Security Through Obscurity

A definition of security through obscurity with an example.

Tokens

A definition of token with examples.

Backdoor

A definition of backdoor with examples.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map