Chapter 11. Access Control Methods and Models
This chapter covers the following subjects:
Access Control Models Defined: This section gets into access control models, such as MAC, DAC, RBAC, and ABAC, plus methodologies such as implicit deny and job rotation. Before creating and enforcing policies, a plan of action has to be developed, and the access control model to be used should be at the core of that plan.
Rights, Permissions, and Policies: Here, we delve into users, groups, permissions, rights, and policies that can be created on a computer ...
Get CompTIA® Security+ SY0-501 Cert Guide, Academic Edition, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.