Access Control and Identity Management

Threats and Vulnerabilities

In this section, you will learn about access control threats and vulnerabilities and how to assess their impact. Access control threats cannot be 100% eliminated because new ones are constantly being devised. Instead, security professionals try to minimize their probability and impact by eliminating as much vulnerability as possible. In order to correctly prioritize efforts at mitigating threats and vulnerabilities, we perform risk assessments to accurately decide which threats represent the biggest impact to resources and data.

Access Control Threats

There are three primary threats to any access control system:

  • Password cracking—Guessing or deciphering passwords ...

Get Access Control and Identity Management, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.