Chapter 8. Physical Security and Authentication Models
This chapter covers the following subjects:
Physical Security—An organization’s building is one of its greatest assets and as such it should be properly protected. This section details door access, biometric readers, access logs, and video surveillance to teach you some of the ways to protect the building, its contents, and its inhabitants and to ensure proper authentication when a person enters a building.
Authentication Models and Components—You can use various methods and models to authenticate a person who wants to access computer networks and resources. This section delves into local authentication technologies such as Kerberos, LDAP, and 802.1X and remote authentication types, for ...