Mile2 Cybersecurity Certifications

Cybersecurity Certifications

Reply To: OCU C)ISSO C Discussion Lesson 04

#106197
Amy Hastings
Participant

The access control characteristics and threats to the access control system are identification, authentication, and authorization. Identification is used to identify things within the system such as the user or the device being used while authentication is the use of passwords and usernames in order to keep the user’s information secure. Authorization is the process of finding the best action to take depending on the problem or depending on what the user is allowed to have access to. Some weaknesses of the access control characteristics would be inside threats including things such as someone gaining access to information outside of the user’s control. Broken access controls would be another threat for this because it can leave your system vulnerable to more threats.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.