AuthenticationWhat is authentication?Verifying who a user is, typically through credentials like a password or token. vs authorizationWhat is authorization?Checking what an authenticated user is allowed to do, like whether they can delete records or access admin pages.: know the difference
Authentication: proving who you are
Authentication answers: "Who are you?" When you enter your password, scan your fingerprint, or use Face ID, you're authenticating.
Authorization: what you're allowed to do
Authorization answers: "What can you do?" Once the system knows who you are, authorization decides what you can access. An admin can delete users. A regular user can only edit their own profile.
You can be authenticated but not authorized, you log in successfully but get "access denied" when trying to view sensitive data.
Passwords: your first line of defense
What makes a password strong
A strong password is:
- Long: at least 12 characters, ideally 16+
- Random: not based on dictionary words, names, or patterns
- Unique: never reused across sites
A 12-character random password takes centuries to brute force. An 8-character password? Hours or days.
Password managers: you need one
You cannot remember strong, unique passwords for every service. A password manager generates and stores them for you. You remember one master password.
Popular options:
- 1Password: paid, business-friendly
- Bitwarden: free tier, open source
- Proton Pass: privacy-focused
- iCloud Keychain: if you're all-in on Apple
Two-factor authenticationWhat is 2fa?Two-factor authentication - requiring a second verification step (like a phone code) on top of your password to prove it's really you. (2FA): your safety net
Passwords can be stolen via phishing or data breaches. 2FA adds a second verification step, even if someone has your password, they need the second factor too.
Types of 2FA:
| Type | How it works | Security level |
|---|---|---|
| SMS code | Text message with 6-digit code | Okay, SIM swapping attacks exist |
| Authenticator app | Time-based codes (Google Authenticator, Authy) | Better, no phone number involved |
| Hardware key | Physical USB device (YubiKey) | Best, requires physical possession |
| Push notification | Tap "yes" on your phone | Good, but can be annoying |
Enable 2FA everywhere you can, especially email, banking, and work accounts.
HTTPSWhat is https?HTTP with encryption added, so data traveling between your browser and a server can't be read or tampered with by anyone in between.: the lock icon explained
HTTPS (HTTPWhat is http?The protocol browsers and servers use to exchange web pages, API data, and other resources, defining how requests and responses are formatted. Secure) encrypts data between your browser and the website. It prevents:
- Snooping: someone on the same WiFi can't read your data
- Tampering: no one can modify the data in transit
- Impersonation: you know you're talking to the real website
How it works (simplified)
When you visit an HTTPS site, your browser and the server perform a "handshakeWhat is handshake?The initial exchange between a client and server that establishes a connection and agrees on communication rules before data starts flowing.":
- Browser asks for the server's public certificate
- Server sends certificate (verified by a trusted authority)
- Browser and server agree on encryptionWhat is encryption?Scrambling data so only someone with the right key can read it, protecting information from being intercepted or stolen. keys
- All communication is encrypted
If your browser shows a "Not Secure" warning or certificate error, stop. Don't enter passwords or credit card numbers.
Common threats you should recognize
Phishing
Phishing tricks you into giving up credentials or clicking malicious links via email, text messages (smishing), or phone calls (vishing).
Red flags:
- Urgent language ("Your account will be suspended!")
- Generic greetings ("Dear Customer" instead of your name)
- Suspicious sender addresses
- Links that don't match the real domain
The rule: When in doubt, go directly to the website by typing the URL. Don't click links in emails.
Malware
Malware (malicious software) includes viruses, ransomware, and spyware. You get infected by downloading pirated software, opening suspicious email attachments, or clicking malicious ads. Prevent it by keeping software updated, using antivirus, and backing up data regularly.
Social engineering
Social engineering manipulates people into breaking security procedures. Common tactics include pretexting (fake scenarios), baiting (infected USB drives), and tailgating (following someone into a secure building).
The defense: Verify identity before sharing sensitive information. A real IT person won't mind if you call them back through the official number.
Quick reference: security fundamentals
| Concept | What it means | Real-world example |
|---|---|---|
| Authentication | Proving who you are | Entering your password |
| Authorization | What you're allowed to do | Admin can delete accounts, users can't |
| 2FA | Second verification step | Entering a code from your phone |
| HTTPS | Encrypted connection | Lock icon in your browser |
| Phishing | Fake emails to steal credentials | "Your account is locked, click here" |
| Malware | Malicious software | Ransomware that encrypts your files |