Log in and benefit from:
Lesson/Domain 2: Access control
[Register here to view the Lesson/Domain 2 webcast and download the quiz.]
Access controls enable the protection of security assets by restricting access to systems and data by users, applications and other systems. In this Security School webcast with expert Shon Harris, learn how access controls support the core security principles of confidentiality, integrity and availability by inducing subjects to positively identify themselves, prove they possess appropriate credentials, and the necessary rights and privileges to obtain access to the target resource and its information.
Access controls are the cornerstone of an information security program. This Domain Spotlight provides an in-depth look at the challenges you'll learn in the webcast on deep exploration of the principles behind access controls, their diverse variety, what threats they can mitigate and the challenges of selecting, implementing and administering them. The following topics are included:
> Read the full Domain Spotlight on access control here.
> Register here to view this webcast and download the quiz on Lesson/Domain 2 -- Access control.
> Go back to the Security School for CISSP Training table of contents.
Additional resources
About Shon Harris:
Shon Harris is a CISSP, MCSE and President of Logical Security, a firm specializing in security educational and training tools. Logical Security offers curriculum, virtual labs, instructor slides and tools for lease by training companies, security companies, military organizations, government sectors and corporations.
Shon is also a security consultant, an engineer in the Air Force's Information Warfare unit, an entrepreneur and an author. She has authored two best selling CISSP books, including CISSP All-in-One Exam Guide, and was a contributing author to the book Hacker's Challenge. Shon is currently finishing her newest book, Gray Hat Hacking: The Ethical Hacker's Handbook.
CISSP® is a registered certification mark of the International Information Systems Security Certification Consortium, Inc., also known as ISC(2).
04 Oct 2004