Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Class notes

Notes for cybersec basics

Rating
-
Sold
-
Pages
3
Uploaded on
03-01-2026
Written in
2025/2026

Notes for basics of cybersec

Institution
Course

Content preview

What is Authorization?
Authorization in cybersecurity refers to the process of granting or denying access to resources
based on the identity and permission level of a user or device (collectively referred to as an
entity).
The authorization process implements access controls that determine the exact activities an entity
is allowed to execute on a specific resource.
Authorization is a crucial component of cybersecurity, strengthening confidentiality, integrity,
and availability of data and resources within an IT environment. It ensures that only authorized
users may access and perform operations on them. It protects your company's sensitive
information from unauthorized access, whether due to internal mistakes or external attacks.
Properly set authorization can contain the damage by limiting entities to the least amount of
data necessary to perform a job.

Authorization vs. authentication
Authentication Authorization
Definitio Verifying the identity of a user, Granting or denying access to resources
n system, or process. based on the authenticated user's
permissions.
Purpose Confirming the user is who they Determining what actions or resources a
claim to be. user is allowed to access.
Focus Identity verification. Access control.
Process Usually involves verifying Involves checking if the authenticated user
credentials (e.g., has the necessary permissions for the
username/password, biometrics). requested action/resource.
Goal Ensuring only authorized users gain Restricting access to specific
access. functionalities or data based on
permissions.
Example Logging into an email account with A user with 'admin' privileges being able to
s a username and password. configure system settings.

Types of authorization
Authorization may be granted based on various criteria or access control models. The three main
models used are:
 Role-based
 Relationship-based
 Attribute-based

Role-Based Access Control (RBAC)
RBAC is a method of authorization that assigns users to specific roles based on their job
responsibilities. Each role has a set of permissions that determine what actions the user can
perform.
For example, a bookkeeper in an accounting department may have read-only access to financial
reports, while a senior accountant may have read-write access.

Written for

Institution
Course

Document information

Uploaded on
January 3, 2026
Number of pages
3
Written in
2025/2026
Type
Class notes
Professor(s)
Sia
Contains
All classes

Subjects

$8.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
kshitijus

Get to know the seller

Seller avatar
kshitijus Sunderdeep
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
4 months
Number of followers
0
Documents
1
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions