CHAPTER 11

Access Control Methods and Models

This chapter covers the following subjects:

images Access Control Models Defined: This section gets into access control models, such as MAC, DAC, RBAC, and ABAC, plus methodologies such as implicit deny and job rotation. Before creating and enforcing policies, a plan of action has to be developed, and the access control model to be used should be at the core of that plan.

images Rights, Permissions, and Policies: Here, we delve into users, groups, permissions, rights, and policies that can be created on a computer ...

Get CompTIA® Security+ SY0-501 Cert Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.