Access Control, Authentication and Public Key Infrastructure

Jones & Bartlett Learning

Access control protects resources against unauthorized viewing, tampering, or destruction. They serve as a primary means of ensuring privacy, confidentiality, and prevention of unauthorized disclosure. Revised and updated with the latest data from this fast paced field, Access Control, Authentication, and Public Key Infrastructure defines the components of access control, provides a business framework for implementation, and discusses legal requirements that impact access control programs. It looks at the risks, threats, and vulnerabilities prevalent in information systems and IT infrastructures and how to handle them. It provides a student and professional resource that details how to put access control systems to work as well as testing and managing them.

Features and Benefits
Available with the Virtual Security Cloud Labs, which provide a hands-on, immersive mock IT infrastructure enabling students to test their skills with realistic security scenarios
A new discussion of recent Chinese hacking incidence
Examples depicting the risks associated with a missing unencrypted laptop containing private data
New sections on the Communications Assistance for Law Enforcement Act (CALEA) and granting Windows folder permissions are added
New information on the Identity Theft Enforcement and Restitution Act and the Digital Millennium Copyright Act (DMCA)
previous edition 9780763791285,
Chapter 1 Access Control Framework
Chapter 2 Assessing Risk and Its Impact on Access Control
Chapter 3 Business Drivers for Access Controls
Chapter 4 Access Control Policies, Standards, Procedures, and Guidelines
Chapter 5 Unauthorized Access and Security Breaches
Chapter 6 Mapping Business Challenges to Access Control Types
Chapter 7 Human Nature, Organizational Behavior, and Considerations
Chapter 8 Access Control for Information Systems
Chapter 9 Physical Security and Access Control
Chapter 10 Access Control in the Enterprise
Chapter 11 Access Control System Implementations
Chapter 12 Access Control Solutions for Remote Workers
Chapter 13 Public Key Infrastructure and Encryption
Chapter 14 Testing Access Control Systems
Chapter 15 Access Control Assurance

Reviews (0)

If you would like to submit a review, you will need to log in or create an account first.
There are no reviews yet