Authentication and Identity #
Digital identity mappings:
- Organization <-> infrastructure
- Phishing
 - MITM attacks
 - Typo squatting
 - Mismatched domains
 - Internationalized domain name (IDN) homograph attack
 - Email security
 
 - User <-> account
- Stealing passwords
 - Cracked breached password databases
 - Credential stuffing
 - Malware / Trojans
 
 - Account <-> real human
 
Black markets allow for specialization of effort:
- Markets for stolen data
 - Malware
 - Phish kits
 - Hacking for hire
 - Botnets
 
Authentication and Authorization #
- Authentication (authn) - Whether users are who they claim to be
 - Authorization (authz) - What users are and aren’t allowed to access
 
Authentication: idenification + challenges (e.g., password, second-factor auth)