Mile2 Cybersecurity Institute

Reply To: OCU C)ISSO A Discussion Lesson 04

#111189
Carlos Martes
Participant

Access control is the process of making sure only the right people can access certain information, systems, or physical areas. One important characteristic is identification, in which a user must claim who they are, such as with a username or ID. The second is authentication, which confirms that identity using passwords, PINS, or biometrics. Another key characteristic is authorization, in which determines what a user is allowed to do once they are logged in. Finally, accountability ensures all user actions are tracked through logs and monitoring. There are also threats to access control. One common threat is password attacks, where attackers try to guess or steal login credentials. Another threat is social engineering, tricking users into giving up secure information. Privilege escalation is when an attacker gains higher access than they should. Lastly, insider threats happen when someone within the organization misuse their access on purpose or accidentally.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Institute

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.