O'Reilly logo

Access Control, Authentication, and Public Key Infrastructure by Tricia Ballad, Bill Ballad, Erin Banks

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. Access Control Policies, Standards, Procedures, and Guidelines

ACCESS CONTROL IS A TOOL we can use to help secure systems. It should never be viewed as an end result. In this chapter, we will discuss the various reasons access control is used in real-world situations. You will discover the important role access control plays in business, government, and critical infrastructures, and how it is used to enforce policies.

We will also discuss what happens when access controls fail. Security breaches can have serious implications ranging from loss of profitability to fines and prison time. The goal of this chapter is to highlight the important role access control plays in the larger scheme of business, governmental regulation, and the operation ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required