Implementing Access Control Best Practices
How you implement access control makes all the difference in how secure your systems are. In this section, we will look at smart cards, access control lists, trusted operating systems, and secure router configuration.
Smart cards are generally used for access control and security purposes. The card itself usually contains a small amount of memory that can be used to store permissions and access information.
Smart cards are difficult to counterfeit, but they’re easy to steal. Once a thief has a smart card, they have all the access the card allows. To prevent this, many organizations don’t put any identifying marks on their smart cards, making it harder for someone to utilize them. A password ...