Chapter 4. Access-Control Systems and Methodology

Terms you'll need to understand:

  • Dictionary attack

  • Brute-force attack

  • Password types

  • Mandatory access control (MAC)

  • Discretionary access control (DAC)

  • Role-based access control (RBAC)

  • Denial-of-service attack (DoS)

  • Honeypots

  • Crossover error rate (CER)

Techniques you'll need to master:

  • Understand access-control techniques

  • Understand the goals of penetration testing

  • Understand the types of intrusion-detection systems

  • Describe the two types of intrusion-detection systems engines

  • Be able to differentiate authorization types

  • Know the advantages of single sign-on technologies

Introduction

Access control is a key component of security. When properly designed, it lets in legitimate users and keeps unauthorized individuals ...

Get CISSP Exam Cram™ 2 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.