CHAPTER 21

Access Control and Authentication

In this chapter, you will

     •   Learn about the methods and protocols for remote access to networks

     •   Distinguish between identification, authentication, authorization, and accounting (AAA) protocols

     •   Be introduced to AAA methods and the security implications in their use

     •   Compare and contrast the function of authentication services

     •   Given a scenario, select the appropriate identification, authentication, authorization, or access control

Access control and authentication are important to control who has access to computer systems and resources. Principles of controlling access and properly authenticating apply to both internal access and remote access. Remote access ...

Get CompTIA Security+ All-in-One Exam Guide, Fourth Edition (Exam SY0-401), 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.