CHAPTER

8  Access Control for Information Systems

THIS CHAPTER FOCUSES ON THE SERVERS and networks that store sensitive information, and how to use the built-in access controls provided by various operating systems to control access to files and data. In the case studies at the end of the chapter, you’ll read about how access controls are built into server and network infrastructures.

Chapter 8 Topics

This chapter covers the following topics and concepts:

Image How access controls protect data

Image How access controls protect file systems

How access controls ...

Get Access Control, Authentication, and Public Key Infrastructure, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.