The access control characteristics and threats to the access control system are identification, authentication, and authorization. Identification is used to identify things within the system such as the user or the device being used while authentication is the use of passwords and usernames in order to keep the user’s information secure. Authorization is the process of finding the best action to take depending on the problem or depending on what the user is allowed to have access to. Some weaknesses of the access control characteristics would be inside threats including things such as someone gaining access to information outside of the user’s control. Broken access controls would be another threat for this because it can leave your system vulnerable to more threats.
SUPPORT
Please Note:
The support ticket system is for technical questions and post-sale issues.