18 Access Control
DOI: 10.1201/b11355-18
Central to the issue of protecting systems and files is the ability to properly control access to sensitive information. The topic of access control, in terms of computer security, allows a data owner to allocate specific authorities to different users. How users are verified, and what access is given each user will depend on the type of access control methodology employed on the network. In order to achieve true network security, access control is an imperative function of any security solution. The world of network security access control covers accountability, identification and authorization, and authentication.
Accountability
Accountability is created when systems log user actions. Pattern monitoring ...
Get Asset Protection through Security Awareness now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.