O'Reilly logo

Security+ Training Guide by Todd King

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Access Control Techniques

Recognize, explain, and differentiate access control methods.

Access control is best described as the process by which use of resources and services is granted or denied. To be effective, access control is used in conjunction with authentication (which is covered in detail in the following section). After a user or device has identified itself to the network, controls can be put in place that grant or deny rights and privileges to that user's ID. The method for putting those controls in place is referred to as an access control policy.

Early access control policy was first defined by the military. In 1967, a group was assembled to review and address computer security issues. The government and military networks of the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required