Chapter 10. Access Control Methods and Models
This chapter covers the following subjects:
Access Control Models Defined: This section gets into access control models, such as MAC, DAC, and RBAC, plus methodologies such as implicit deny and job rotation. Before creating and enforcing policies, a plan of action has to be developed, and the access control model to be used should be at the core of that plan.
Rights, Permissions, and Policies: Here, we delve into users, groups, permissions, rights, and policies that can be created on a computer network. ...