CHAPTER SUMMARY
In this chapter, you learned that access controls are ways to permit or deny access to protected resources, such as physical assets (e.g., buildings or rooms) or to data and information systems. Furthermore, organizations use them to manage what personnel and processes can and cannot do by specifying who (or what) users are, what they can do, which resources they can get to, and what operations they can carry out. To perform this function, access control systems use several technologies, including passwords, hardware tokens, biometrics, and certificates.
You learned that the four parts of access control are identification, authorization, authentication, and accountability. These four parts create an access control process ...