CHAPTER
8 Access Control for Information Systems
THIS CHAPTER FOCUSES ON THE SERVERS and networks that store sensitive information, and how to use the built-in access controls provided by various operating systems to control access to files and data. In the case studies at the end of the chapter, you’ll read about how access controls are built into server and network infrastructures.
Chapter 8 Topics
This chapter covers the following topics and concepts:
How access controls protect data
How access controls protect file systems
How access controls ...
Get Access Control, Authentication, and Public Key Infrastructure, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.