unit_3_p1_tech_7350_c4 - TECH 7350 Managing Information...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: TECH 7350 Managing Information Security The Graduate School of Management at the University of Dallas TECH 7350 MANAGING INFORMATION MANAGING INFORMATION SECURITY SECURITY Sandra Blanke, Ph.D., CISSP The Graduate School of Management at the University of Dallas Unit 3 Chapter 4 Access Control Unit 3 Chapter 4 Access Control Part 1 of 5 Part 1 of 5 2 Learning Objectives The importance of access controls What are access controls What is a subject and object? Authentication IdM What is Federation? 3 Why is this Important to YOU? Access control refers to your method identifying who a user is Without properly managing access control, the rest of the security system and policies are worthless! Multiple points of authentication in a network create multiple opportunities for improper entry and use TECH 7350 Managing Information Security The Graduate School of Management at the University of Dallas 4 Access Control Test Access controls are security features: That control how users and systems communicate & interact How user names and passwords are assigned That protect the system and resources from unauthorized...
View Full Document

Page1 / 5

unit_3_p1_tech_7350_c4 - TECH 7350 Managing Information...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online