O'Reilly logo

Access Control, Authentication, and Public Key Infrastructure by Tricia Ballad, Bill Ballad, Erin Banks

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 1. Access Control Framework

ACCESS CONTROLS ARE THE METHOD by which users gain access to resources to fulfill business needs. Business drivers should always be at the heart of any access control system, because even the most secure system is useless if it does not advance or support the goals of the organization.

Part 1 of this book discusses the need for access controls. The consequences of weak or nonexistent access control range from inconvenient to downright disastrous, depending on the nature of the resources being protected. For the average user, it may be annoying and inconvenient to have someone else reading your e-mail. On the other end of the scale, without strong access controls, companies could lose billions of dollars when ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required