O'Reilly logo

TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 by Shawn Porter, Debra Littlejohn Shinder, Mike Chapple

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Identify, Specify, or Describe Good Access Control and Authentication Processes and Techniques

Access control, authentication, and accounting combine to form the triple-A (“AAA”) basis for computer security. A solid understanding of these principles is essential knowledge for any security professional. These three key terms may be defined as follows:

  • Access control. Manages which individuals or accounts may interact with specific resources, and governs what kinds of operations such individuals or accounts may perform on those resources. Access controls usually rest on some notion of identity, which may be associated with a specific individual or account, or with a group to which that individual or account belongs.

  • Authentication. Verifies a ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required