Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
In this last section we wrap up Access Controls by reviewing all the key objectives that contribute to an effective Access Control system. We discuss IAAA, review Access Control Models and the three types of Authentication, detail the Authorization process life cycle, and finally reexamine Centralized vs. Decentralized Administration.