Index

A

  • ABAC (attribute-based access control), 62
  • abstraction, 468
  • access control, 3
    • ABAC (attribute-based access control), 62
    • accountability, 32–34
    • accounting and, 565
    • AD (Active Directory), 574
    • admission, 569–570
    • authentication and, 565
    • authorization and, 565
    • centralized, 58
    • compensating controls, 105–106
    • corrective, 104
    • DAC (discretionary access control), 59
    • data classification, 7–9
    • decentralized, 58–59
    • decision-making, 568–569
    • detective controls, 103–104
    • deterrent controls, 101–103
    • device authentication, 35
    • devices, 53
    • dual control, 97
    • federated access, 36–38
    • IEEE 802.1X Port-Based Access Control Standard, 573
    • implementation, 58–63
    • integrity protection, 11
    • Kerberos, 573–574
    • LANs (local area networks), 4–5
    • least privilege, 94–95
    • lifecycle, ...

Get The Official (ISC)2 SSCP CBK Reference, 5th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.