Chapter 4. Access-Control Systems and Methodology
Terms you'll need to understand:
Dictionary attack
Brute-force attack
Password types
Mandatory access control (MAC)
Discretionary access control (DAC)
Role-based access control (RBAC)
Denial-of-service attack (DoS)
Honeypots
Crossover error rate (CER)
Techniques you'll need to master:
Understand access-control techniques
Understand the goals of penetration testing
Understand the types of intrusion-detection systems
Describe the two types of intrusion-detection systems engines
Be able to differentiate authorization types
Know the advantages of single sign-on technologies
Introduction
Access control is a key component of security. When properly designed, it lets in legitimate users and keeps unauthorized individuals ...
Get CISSP Exam Cram™ 2 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.