In this excerpt of Chapter 13: Access Control from Information Security: Design, Implementation, Measurement, and Compliance
author Timothy P. Layton examines how network services should be managed to ensure unauthorized access is prevented and provides questions that should be considered when establishing network-based access controls.