CHAPTER 2
Access Controls
In this chapter, you will learn about
• Identification, authentication, and authorization
• Three factors of authentication
• Single sign-on
• One-time passwords
• Access controls with subjects and objects
• Access control models (DAC, non-DAC, MAC, RBAC, and ABAC)
• Bell-LaPadula, Biba, Clark-Wilson, and Brewer-Nash architectures
• Identity and access management (IAM) systems
• Physical security controls
Comparing Identification, Authentication, and Authorization
A key part of any access control system is the identification and authentication of individuals. If you can’t identify individuals, everyone is anonymous. If everyone is anonymous, there is no way you can control access to different resources. Either ...
Get SSCP Systems Security Certified Practitioner All-in-One Exam Guide, Third Edition, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.