Chapter 10. Access Control Systems and Methodology
After reading this chapter and completing the exercises, you will be able to do the following:
Apply access control techniques to meet confidentiality and integrity goals
Understand and implement the major terms and concepts related to access control and tie them to system security
Apply discretionary access controls (DAC) and mandatory access controls (MAC) techniques, as appropriate ...