Access Control protects resources against unauthorized viewing, tampering, or
destruction. They serve as a primary means of ensuring privacy, confidentiality, and
prevention of unauthorized disclosure. Revised and updated with the latest data from
this fast-paced field, Access Control, Authentication, and Public Key Infrastructure
defines the components of access control, provides a business framework for
implementation, and discusses legal requirements that impact access control
programs. It looks at the cybersecurity risks, threats, and vulnerabilities prevalent in
information systems and IT infrastructures and how to handle them. It provides a
student and professional resource that details how to put access control systems to
work as well as testing and managing them.
-
Course Learning Outcomes
- Define authorization and access to an IT infrastructure based on an access control policy framework
- Mitigate risk to an IT infrastructure’s confidentiality, integrity, and availability with sound access controls.
- Analyze how a data classification standard impacts an IT infrastructure’s access control requirements and implementation
- » Define proper security controls within the User Domain to mitigate risks
- » Implement appropriate access controls for information systems within IT infrastructures
- » Implement a secure remote access solution