Hi. In this unit, we are going to talk about Identity and Credentials. Let's go start with Identities. To start talking about Identities, we are going to ask to the dictionary. Identities can be defined as the quality of a person or group that make them different from others. A person like me, for example, what kind of qualities, things like my name, my name is Ivan, that I always wear glasses, I like rap music, thing like that. Of course in a person this list of qualities is huge but what about Digital Identities? Because we're more interested in Digital Identities. Digital Identities are similar to identities found in a Cyberworld. When we are in the Cyberworld, we have three new features we have to focus on, the first is that there are more entities not only personal groups. For example, we have here what servers, we have devices, we have a lot of different things that are presented in the Cyberworld. The second important feature is that here is very common to have different digital entities not just one. In the real world maybe you think you have one entity or maybe you have different entities according to when you are in the work for example or you are at home but in the Cyberworld is very common to have digital. For example, you can have different digital entities for email: an email for work, another email account for friends for example, one digital entity for our learning platform, for streaming platform, for Instagram for example, or thing like that. So it's very common to have different digital entities. The third important property in digital entities is that, we need to specify all the qualities of the person. In the real world we don't need to specify all the qualities of a person, you have identity and of course a set of a lot of different qualities but is not required to write down all the qualities for a person. In the digital world, in the Cyberworld, we need to write it down. We need to formalize in a digital asset and we need to a strongest store these qualities in the form for credentials. Of course we also have to credentials in the real world but in the Cyberworld, credentials must be strongly protective, must be secret. You don't have to surge your credentials. So just to summarize this concept, in Cyberworld, we have entities not only person of groups. We have entity that include for example, computers, the entities have multiple digital identities and the digital identities have several qualities. All of these are installed in credentials. Let me show you an example. Imagine I want to connect to interact with learning platform and I say to the learning platform, "Hi, I want to access to my courses," but the learning platform don't know who I am. So the answer is okay, I don't know who you are. Please send me your credential to identify you. After that, I have to send my credentials and spoiler, the credentials can be only a username and a password. So I send for example, my username and my password and after I check in, the learning platform give me a response saying okay, you are Ivan and here are your courses, your resources, wherever, you have in the learning platform. So remember, credential is an element that binds your digital identity with the owner of that credential. It's important we have the digital identity and we have the owner we have to bind them altogether. So we need the credential and credential is a very important element in Cybersecurity, even can be the most important element in Cybersecurity. So you have to protect it very carefully because if someone, if an attacker steals your credential, the attacker is due, he is due for some part of the Cyberworld, for some part of the Internet. It's like in the real world like if an attacker take your face and put itself in order to go to access to your bank, for example. So be careful with that. According to the nature of the buying of the digital identity and the owner, we have three different types of credentials. The credentials based in something I know, the credentials based in something I have, and the credentials based in something I am. When we talk about credential based in something I know, these are memories or problems that only one user know how to solve. This type of credentials is the username and password for example, and is the commonest type of credentials. But it's not the safest because sometimes it's very easy that someone, an attacker can last steal this kind of credentials. In the something I have type, we have an element, a physical object of a digital asset that belongs to us. So if we have this element, we can have the credential so we can identify our self. You can see here in the picture, Anna. Anna is using a special USB device in order to access and work with her computer. You can use USB devices like this or you can use smartphones or smart cards. The last type is the something I am type. Here, we are using the viology. So we take something that you are, we take something of your viology in order to create the grand cells. So here again, in the picture you can see Anna accessing to her cell phone and is using her fingerprint in order to gain access. We can use fingerprints, we can use face ID, face detection, we can use even more advanced techniques like iris detection or behavior detection for people. So just to conclude these unit, remember, credentials are using to identify you on Internet and are very important elements. So you have to be careful and protect the credentials always. Okay. If you don't protect their credentials, remember you are going to suffer identity impersonation and you don't want it. See you in next units.