From the course: Cisco Certified CyberOps Associate (200-201) Cert Prep: 1 Security Concepts
Unlock the full course today
Join today to access over 22,400 courses taught by industry experts or purchase this course individually.
Comparing access control models
From the course: Cisco Certified CyberOps Associate (200-201) Cert Prep: 1 Security Concepts
Comparing access control models
- [Narrator] When trying to gain access to resources, access control will first check to see if the subject has the appropriate permissions to interact with the object, to complete actions such as or view a file, write modify or delete file contents or execute, which enables the subject to run an application. To ensure compliance with the access controls and policies, we use auditing, which records or logs events such as a user attempting to create access or delete files or folders. There are several types of access control models that differ in the way the permissions are assigned. Let's talk about each of these. Discretionary access control is the most flexible as it allows the object owner to decide who can access the object. Think about it this way. At their discretion, they can grant permissions to allow users or groups to access the object. For example, the owner can share the object such as a folder and then…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
Using the principle of least privilege3m 10s
-
Defining access control3m 33s
-
Comparing access control models5m 19s
-
Summarizing triple-A security3m 19s
-
Verifying authentication1m 57s
-
Granting authorization2m 40s
-
Accounting and logging activity3m 42s
-
Challenge: Network diagram54s
-
Solution: Network diagram4m 39s
-
-
-
-