• Define access control and list the four access control models
• Describe how to implement access control
• Explain the different types of authentication services
“She looks after every tax dollar as if it were her own,” was the glowing praise heaped upon Rita Crundwell by a city commissioner for her exemplary work as city comptroller of Dixon, Illinois. However, the commissioner was more accurate than he may have imagined. The very next year Crundwell pleaded guilty to embezzling an astonishing $53 million from her city over 20 years, the largest known embezzlement to have ever occurred in the public sector. ...