Access Control Techniques
Recognize, explain, and differentiate access control methods.
Access control is best described as the process by which use of resources and services is granted or denied. To be effective, access control is used in conjunction with authentication (which is covered in detail in the following section). After a user or device has identified itself to the network, controls can be put in place that grant or deny rights and privileges to that user's ID. The method for putting those controls in place is referred to as an access control policy.
Early access control policy was first defined by the military. In 1967, a group was assembled to review and address computer security issues. The government and military networks of the ...