Did you know Cybrary's video training is FREE? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
For this section, we continue our discussion on Access Controls enforcement with a distinction between context-based and content-based access control then correlate that to how it's accessed. We also discuss at length centralized administrative controls, and review what advantages and disadvantages it has for security policy development and management. For example, we examine RADIUS and discuss how its centralized administrative infrastructure is configured, the user population it supports, and what security and access control shortcomings it may present.