9781111640125_IM_ch09

Security+ Guide to Network Security Fundamentals

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Security+ Guide to Network Security Fundamentals, Fourth Edition 9-1 Chapter 9 Access Control Fundamentals At a Glance Instructor’s Manual Table of Contents Overview Objectives Teaching Tips Quick Quizzes Class Discussion Topics Additional Projects Additional Resources Key Terms
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Fourth Edition 9-2 Lecture Notes Overview This chapter introduces the principles and practices of access control. You will first examine access control terminology, the three standard control models, and best practices. Then, you will investigate logical access control methods. Finally, you will explore physical access control. Chapter Objectives Define access control and list the four access control models Describe logical access control methods Explain the different types of physical access control Define authentication services Teaching Tips What Is Access Control? 1. Define access control as the process by which resources or services are granted or denied on a computer system or network. 2. Mention that there are four standard access control models as well as specific practices used to enforce access control. Access Control Terminology 1. Explain that identification means that a user accessing a computer system would present credentials or identification, such as a username. 2. Define authentication as checking the user’s credentials to be sure that they are authentic and not fabricated. Authorization means granting permission to take the action. 3. Mention that a computer user is granted access to only certain services or applications in order to perform their duties. Use Table 9-1 to describe the basic steps in access control. Teaching Tip Although authorization and access are sometimes viewed as synonymous, in access control, they are different steps.
Background image of page 2
Security+ Guide to Network Security Fundamentals, Fourth Edition 9-3 4. Explain that computer access control can be accomplished by one of three entities: hardware, software, or a policy. 5. Mention that access control can take different forms depending on the resources that are being protected. 6. Define other terminology used to describe how computer systems impose access control, including: a. Object b. Subject c. Operation 7. Use Table 9-2 and Figure 9-1 to describe the process and terminology in access control. Access Control Models 1. Explain that an access control model provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications. 2. Once an access control model is applied, custodians can configure security based on the requirements set by the owner so that end users can perform their job functions.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 10

9781111640125_IM_ch09 - Security+ Guide to Network Security...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online