O'Reilly logo

CompTIA Security+ SY0-401 In Depth by Mark Ciampa

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

chapter 11Access Control Fundamentals

After completing this chapter, you should be able to do the following:

• Define access control and list the four access control models

• Describe how to implement access control

• Explain the different types of authentication services

Today’s Attacks and Defenses

“She looks after every tax dollar as if it were her own,” was the glowing praise heaped upon Rita Crundwell by a city commissioner for her exemplary work as city comptroller of Dixon, Illinois. However, the commissioner was more accurate than he may have imagined. The very next year Crundwell pleaded guilty to embezzling an astonishing $53 million from her city over 20 years, the largest known embezzlement to have ever occurred in the public sector. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required