Access Control and Authentication Methods and Models
Overview Write 4–6 pages explaining how access control lists play a role in a layered network security strategy, and the benefits available through domain separation, process isolation, resource encapsulation, and least privilege.
Explore the basics of operating systems and operating system security, including privileged and non-privileged states, threads and processes, and memory management.
Focus on authentication and access controls including file systems, isolation, separation, and encapsulation.
SHOW LESS
Questions to Consider To deepen your understanding, you are encouraged to consider the questions below and discuss them with a fellow learner, a work associate, an interested friend, or a member of the business community.