O'Reilly logo

Eleventh Hour Security+ by Ido Dubrawsky

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Logical Access Control Methods

Access control can be broken up into two primary methods, logical and physical. Logical access control involves applying access controls to logical entities such as data or the ability to perform a certain action on a computer. This differs from physical access control methods in that physical access control deals with limiting the ability to physically interact with an entity.

Access control lists

ACLs are lists of permissions associated with access control objects. Access control subjects are listed in the ACL as well as the level of permission that the subject is granted to the object. This is all part of the DAC model as ACLs are enforced on a discretionary basis rather than being mandated by the operating ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required