CHAPTER |
Access Control for Information Systems |
THIS CHAPTER FOCUSES ON THE SERVERS and networks that store sensitive information and how to use the built-in access controls provided by various operating systems to control access to files and data. In the case studies at the end of the chapter, you’ll read about how access controls are built into server and network infrastructures.
This chapter covers the following topics and concepts:
When you complete this chapter, you will be able to: