Chapter 10. Access Control Systems and Methodology

Chapter Objectives

After reading this chapter and completing the exercises, you will be able to do the following:

Image Apply access control techniques to meet confidentiality and integrity goals

Image Understand and implement the major terms and concepts related to access control and tie them to system security

Image Apply discretionary access controls (DAC) and mandatory access controls (MAC) techniques, as appropriate ...

Get Information Security: Principles and Practices, Second Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.