CHAPTER 2

Access Controls

In this chapter, you will learn about

•  Identification, authentication, and authorization

•  Three factors of authentication

•  Single sign-on

•  One-time passwords

•  Access controls with subjects and objects

•  Access control models (DAC, non-DAC, MAC, RBAC, and ABAC)

•  Bell-LaPadula, Biba, Clark-Wilson, and Chinese Wall architectures

•  Identity management

•  Physical security controls

Comparing Identification, Authentication, and Authorization

A key part of any access control system is the identification and authentication of individuals. If you can’t identify individuals, everyone is anonymous. If everyone is anonymous, there is no way you can control access to different resources. Either everyone has access ...

Get SSCP Systems Security Certified Practitioner All-in-One Exam Guide, Second Edition, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.