O'Reilly logo

Wireless Security: Know It All by Jon S. Wilson, Chris Lanthem, Frank Thornton, George L Stefanek, Timothy Stapko, James F. Ransome PhD, CISM, CISSP, John Rittinghouse PhD, CISM, Stephen A. Rackley, Chris Hurley, Tony Bradley, Dan Bensky, Praphul Chandra

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 13. Managing Access

Even the most secure of systems is vulnerable to compromise if anyone can just walk in, pick up the computer, and walk out with it. Physical prevention measures must be used in conjunction with information security measures to create a total solution. Herein, we cover the essential elements every security administrator needs to know about access control and management of passwords.

13.1. Access Control

According to the Information Systems Security Association (ISSA) [1], “access control is the collection of mechanisms for limiting, controlling, and monitoring system access to certain items of information, or to certain features based on a user’s identity and their membership in various predefined groups.” In this ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required