Skip to Main Content
Cyber Power
book

Cyber Power

by Solange Ghernaouti-Helie
April 2016
Intermediate to advanced content levelIntermediate to advanced
220 pages
15h 17m
English
EPFL Press
Content preview from Cyber Power
Cybersecurity Governance and Security Measures 387
The user prole contains all the information necessary for decisions about
access authorisations. This prole, which needs to be dened very carefully,
is the result of the denition of the policy relating to access management.
When granting a user access to the requested service, the access control sys-
tem performs a verication of the user’s access rights that takes into account
the consistency of the requested service, the equipment used, and the time and
date of the request. The consistency review consists of comparing the prole
of the service with the proles of the user and of the system from which the
request has been received. The authorisation will be granted when the ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Cyber Warfare

Cyber Warfare

Jason Andress, Steve Winterfeld
Cyber Minds

Cyber Minds

Shira Rubinoff
Cybercrime

Cybercrime

Todd Wade

Publisher Resources

ISBN: 9781466573048