Chapter 9. Access Control Methods and Models
This chapter covers the following subjects:
Access Control Models Defined—This section gets into access control models, such as MAC, DAC, and RBAC, plus methodologies such as implicit deny and job rotation. Before creating and enforcing policies, a plan of action has to be developed, and the access control model to be used should be at the core of that plan.
Rights, Permissions, and Policies—Here, we delve into users, groups, permissions, rights, and policies that can be created on a computer network. By configuring users, templates, and groups in a smart fashion, you can ease administration and increase security at the same time. Policies can control just about anything a user does on the network ...
Get CompTIA Security+ SY0-201 Cert Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.