Chapter 5. Unauthorized Access and Security Breaches

ACCESS CONTROLS EXIST because of the risk of unauthorized access to valuable information and resources. The consequences of unauthorized access can be serious—loss of reputation, financial losses, and even the loss of life if military or infrastructure resources are compromised. In this chapter, you will discover what happens when access controls fail.

Get Access Control, Authentication, and Public Key Infrastructure now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.