Skip to content

Week 07 Quiz

Test your understanding of the weekly concepts.

Format: 10 multiple-choice questions. Passing score: 70%. Time: Untimed.

Take Quiz
CSY101 Week 07 Beginner

Practice authentication and access control concepts with hands-on labs. Complete these before moving to reading resources.

Cybersecurity Essentials

Track your progress through this week's content

Week Introduction

๐Ÿ’ก Mental Model

Identity is the new security perimeter. In cloud and remote work environments, "inside the network" no longer means "trusted." Every access decision must verify identity and enforce least privilege.

This week explores how systems establish identity (authentication), decide what identities can do (authorization), and why identity compromise is the most common initial attack vector. You'll learn why passwords fail, what makes authentication strong, and how to design access control that balances security with usability.

Learning Outcomes (Week 7 Focus)

By the end of this week, you should be able to:

  • LO5 - Identity & Access: Distinguish authentication from authorization and explain why both are critical security boundaries
  • LO3 - Threat Landscape: Identify credential-based attacks (phishing, stuffing, brute force) and their defenses
  • LO4 - Risk Reasoning: Apply least privilege principle to access control design

Lesson 7.1 ยท The Identity Stack: Identity โ†’ Authentication โ†’ Authorization

Core distinction: These three concepts form a security chain. Each must work correctly or the entire access control system fails.

1. Identity (Who are you claiming to be?)

  • Definition: A unique identifier representing a user, device, or service
    Examples: Username, email address, employee ID, device serial number, service account name
  • Key property: Identities are claimed, not proven (anyone can type "admin")
    Security implication: Identity alone grants nothing โ€” must be verified

2. Authentication (Prove you are who you claim to be)

  • Definition: Process of verifying claimed identity using credentials
    Examples: Password check, biometric scan, hardware token, certificate validation
  • Key property: Authentication proves identity but doesn't define permissions
    Security implication: Authenticating as "alice" doesn't mean you can access admin functions

3. Authorization (What are you allowed to do?)

  • Definition: Process of determining what an authenticated identity can access/modify
    Examples: Read file, write database, execute command, approve transaction
  • Key property: Authorization decisions happen after authentication succeeds
    Security implication: Most privilege escalation attacks exploit authorization flaws, not authentication

The complete access control flow:

  1. Claim identity: User enters "alice@company.com"
  2. Authenticate: System verifies password + MFA token
  3. Establish session: System issues session token (proof of successful authentication)
  4. Authorization check: For each action, system asks: "Is alice@company.com allowed to delete this file?"
  5. Grant or deny: Based on policies (role-based, attribute-based, etc.)

Common failure pattern: Broken authorization

Many breaches occur because authentication works but authorization doesn't:

  • Insecure Direct Object Reference (IDOR): User authenticated, but can access other users' data by changing URL parameter
  • Privilege escalation: Standard user authenticated, but can call admin-only API endpoints
  • Missing function-level access control: UI hides admin buttons, but API doesn't check permissions

Example: Facebook photo privacy bug โ€” users authenticated correctly, but authorization check failed, allowing anyone to view "private" photos by guessing photo IDs.

Lesson 7.2 ยท Authentication Factors and Multi-Factor Authentication (MFA)

Core principle: Authentication strength depends on the type and number of factors used. Each factor type addresses different attack vectors.

The three authentication factor types:

Why Multi-Factor Authentication (MFA) Matters:

Using factors from different categories dramatically reduces risk:

Real-world impact of MFA:

MFA hierarchy (weakest to strongest):

  1. SMS codes: Vulnerable to SIM swapping, but still far better than password-only
  2. Authenticator apps (TOTP): More secure than SMS, resistant to interception
  3. Push notifications: Convenient, but vulnerable to "MFA fatigue" attacks (spamming approvals)
  4. Hardware security keys (FIDO2/WebAuthn): Strongest โ€” phishing-resistant, cryptographic proof

Critical insight: Two passwords โ‰  MFA

Multi-factor means factors from different categories. Using two passwords is still single-factor (both are "something you know"). True MFA combines knowledge + possession, or knowledge + biometric.

Lesson 7.3 ยท Credential-Based Attacks: Why Identity Is the New Perimeter

Core reality: Stealing credentials is easier than exploiting technical vulnerabilities. Once attackers have valid credentials, they bypass most security controls โ€” they look like legitimate users.

Common credential attack patterns:

Why credentials are attacker gold:

Lesson 7.4 ยท Least Privilege and Access Control Models

Principle of Least Privilege: Grant the minimum permissions necessary to perform a task, for the minimum time required. Every additional permission is potential attack surface.

Why least privilege matters:

Common access control models:

Implementing least privilege in practice:

Lesson 7.5 ยท Identity as the New Perimeter (Zero Trust)

Paradigm shift: Traditional security assumed "trusted internal network" vs "untrusted internet." Modern reality: work from anywhere, cloud services, BYOD โ€” network location no longer indicates trust.

Old model (Perimeter-Based Security):

New model (Zero Trust / Identity-Centric):

Zero Trust principles:

  1. Verify explicitly: Always authenticate and authorize based on all available data points
  2. Use least privilege access: Limit user access with Just-In-Time and Just-Enough-Access (JIT/JEA)
  3. Assume breach: Minimize blast radius, segment access, verify end-to-end encryption, use analytics for threat detection

Why identity became the perimeter:

Practical example: Instead of "VPN = full network access," Zero Trust grants access per-application based on identity, device posture, and context. Sales rep on personal laptop gets CRM access (read-only) but not internal HR systems.

Self-Check Questions (Test Your Understanding)

Answer these in your own words (2-3 sentences each):

  1. What is the difference between authentication and authorization? Give one example of each failing independently.
  2. Explain the three authentication factor types. Why is password + security question NOT multi-factor?
  3. Why are credentials more valuable to attackers than exploiting technical vulnerabilities?
  4. What is the principle of least privilege? How does it limit blast radius when compromise occurs?
  5. What does "identity is the new perimeter" mean? Why did network-based perimeter security become insufficient?

Lab 7 ยท Identity and Access Control Design

Time estimate: 40-50 minutes

Objective: Design an identity and access control system for a real application. You will map identity types, define authentication requirements, implement least privilege, and identify credential-based attack risks.

Step 1: Choose Your Application (5 minutes)

Select one application context:

Why it matters: Different user types need different permissions โ€” access control must match business roles.

Step 2: Map Identity Types and Permissions (15 minutes)

Create a table mapping at least 4 identity types to their permissions:

Identity Type Authentication Required Permissions (What they can do) Restrictions (What they cannot do)
Patient Password + SMS MFA View own records, request appointments, message own doctor Cannot view other patients, cannot modify medical records, cannot access billing system
Doctor Password + Hardware Key (FIDO2) View assigned patients, update medical records, prescribe medications Cannot access patients outside assignment, cannot modify billing, cannot access other doctors' notes
Admin Password + Hardware Key + Approval Manage users, configure system, access audit logs Cannot view patient medical records (separation of duties), actions are logged

Create your own table with at least 4 identity types, applying least privilege principle.

Step 3: Design Authentication Requirements (10 minutes)

For each identity type, justify authentication strength:

Example justification for healthcare portal:

Step 4: Identify Credential Attack Risks (10 minutes)

For each identity type, identify the most likely credential attack and mitigation:

Example for e-learning platform:

Step 5: Apply Least Privilege (10 minutes)

Review your permissions table and identify at least two improvements using least privilege:

Example improvements:

Success Criteria (What "Good" Looks Like)

Your lab is successful if you:

Extension (For Advanced Students)

If you finish early, explore these questions:

๐ŸŽฏ Hands-On Labs (Free & Essential)

Practice authentication and access control concepts with hands-on labs. Complete these before moving to reading resources.

๐ŸŽฎ TryHackMe: Password Security

What you'll do: Explore password storage, hashing basics, and common password weaknesses.
Why it matters: Weak authentication is the most common initial access vector. Understanding password security is foundational.
Time estimate: 1-1.5 hours

Start TryHackMe Password Security โ†’

๐ŸŽฎ TryHackMe: Authentication Bypass

What you'll do: Practice common authentication failure patterns and how attackers bypass weak login logic.
Why it matters: Seeing real authentication bypasses makes it easier to design robust access controls.
Time estimate: 1.5-2 hours

Start TryHackMe Authentication Bypass โ†’

๐Ÿ PicoCTF Practice: Cryptography (Hashes + Passwords)

What you'll do: Solve beginner challenges that involve hashing, basic crypto, and password patterns.
Why it matters: Authentication depends on secure credential storage and verification. Crypto basics support that.
Time estimate: 1-2 hours

Start PicoCTF Cryptography โ†’

๐Ÿ’ก Lab Tip: When practicing authentication, always ask: "What identity is being proven, and what access does that identity unlock?"

Resources (Free + Authoritative)

Work through these in order. Focus on authentication best practices and access control principles.

๐Ÿ“˜ NIST SP 800-63 - Digital Identity Guidelines

What to read: Executive Summary and Section 4 "Digital Identity Model" (pages 6-15).
Why it matters: Authoritative framework for authentication strength and identity assurance levels. US government standard, widely adopted.
Time estimate: 25 minutes

Open Resource

๐ŸŽฅ Computerphile - Authentication Explained (Video)

What to watch: Full video on authentication factors and why passwords fail.
Why it matters: Clear explanation of authentication fundamentals and common vulnerabilities.
Time estimate: 15 minutes

Open Resource

๐Ÿ“˜ OWASP - Broken Access Control

What to read: Overview and examples of authorization failures (from OWASP Top 10).
Why it matters: Authorization bugs are #1 web application risk. Real-world attack patterns and defenses.
Time estimate: 20 minutes

Open Resource

๐Ÿ“˜ Microsoft - Zero Trust Security Model

What to read: Introduction to Zero Trust principles and identity-centric security.
Why it matters: Explains why identity replaced network perimeter as primary security boundary.
Time estimate: 15 minutes

Open Resource

Tip: Completion and XP persist via localStorage. If progress doesn't update immediately, refresh once.

Weekly Reflection Prompt

Aligned to LO5 (Identity & Access) and LO4 (Risk Reasoning)

Write 200-300 words answering this prompt:

Explain why identity has become "the new security perimeter" in modern systems. Use your Lab 7 access control design as an example.

In your answer, include:

What good looks like: You demonstrate understanding that identity controls are now the primary security boundary (not network firewalls). You explain why attackers target credentials over code vulnerabilities (easier, bypasses most controls). You show that effective access control requires both strong authentication (MFA) AND proper authorization (least privilege). You connect technical controls to business reality (remote work, cloud, BYOD).