Security+ Certification/Access Control
3.1 Identify and apply industry best practices for access control methods
edit- Implicit deny
- Least privilege
- Separation of duties
- Job rotation
3.2 Explain common access control models and the differences between each
edit- MAC
- DAC
- Role & Rule based access control
3.3 Organize users and computers into appropriate security groups and roles while distinguishing between appropriate rights and privileges
edit3.4 Apply appropriate security controls to file and print resources
edit3.5 Compare and implement logical access control methods
edit
|
|
3.6 Summarize the various authentication models and identify the components of each
edit- One, two and three-factor authentication
- Single sign-on
3.7 Deploy various authentication models and identify the components of each
edit
|
|
3.8 Explain the difference between identification and authentication (identity proofing)
edit3.9 Explain and apply physical access security methods
edit
|
|