Index
Numbers
3DES cryptography
802.1X standard
802.11 wireless protocol
A
acceptable use policy
adaptability
completeness
explained
legality
protection for employees
Review Answer
uniqueness to environment
access control best practices
Checkpoint
explicit deny
implicit deny
least privilege
mandatory vacations
rotation of job duties
separation of duties
access control models
DAC (discretionary access control)
MAC (mandatory access control)
RBAC (role-based access control)
Review Question
rule-based access control
access control policies
job rotation
least privilege
mandatory vacations
separation of duties
access controls
Checkpoint
explained
full access
logical
no access
user hierarchies
See also users and resources
access logs
overview
Review ...