This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: TECH 7350 – Managing Information Security The Graduate School of Management at the University of Dallas TECH 7350 MANAGING INFORMATION MANAGING INFORMATION SECURITY SECURITY Sandra Blanke, Ph.D., CISSP The Graduate School of Management at the University of Dallas Unit 3 Chapter 4 Access Control Unit 3 Chapter 4 Access Control Part 1 of 5 Part 1 of 5 2 Learning Objectives ¡ The importance of access controls ¡ What are access controls ¡ What is a subject and object? ¡ Authentication ¡ IdM ¡ What is Federation? 3 Why is this Important to YOU? ¡ Access control refers to your method identifying who a user is ¡ Without properly managing access control, the rest of the security system and policies are worthless! ¡ Multiple points of authentication in a network create multiple opportunities for improper entry and use TECH 7350 – Managing Information Security The Graduate School of Management at the University of Dallas 4 Access Control ¡ Test Access controls are security features: ¢ That control how users and systems communicate & interact ¢ How user names and passwords are assigned ¢ That protect the system and resources from unauthorized...
View Full Document
- Spring '11
- Authorization, Sandra Blanke