O'Reilly logo

CISSP Training Kit by David R. Miller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Trusted path

Enterprises operate with a fundamental expectation of trust for their workers. They expect that after a worker is trained regarding the policies of the company, that worker tends to abide by the rules stated within the policies. The following statement is the basis for the interaction between the (relatively) trusted workers and the information systems:

  • Subjects access objects.

    • The subject is the active entity that wants to interact with the information system. The subject is classically a user, a person, a worker, but can also loosely be considered a process.

    • The object is the repository of information, such as a file, a written document, or a record in a database.

    • The access implies a flow of information between the subject and the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required