O'Reilly logo

CISSP Study Guide by Joshua Feldman, Seth Misenar, Eric Conrad

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3

Domain 2Access control

Exam objectives in this chapter

• Cornerstone Access Control Concepts

• Access Control Models

• Procedural Issues for Access Control

• Access Control Defensive Categories and Types

• Authentication Methods

• Access Control Technologies

• Types of Attackers

• Assessing Access Control

Unique terms and definitions

• Subject—An active entity on an information system

• Object—A passive data file

• Discretionary Access Control (DAC)—gives subjects full control of objects they have been given access to, including sharing the objects with other subjects

• Mandatory Access Control (MAC)—system-enforced access control based on subject’s clearances and object’s labels

• Role-Based Access Controls (RBAC)—subjects are grouped ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required