Access Controls

m

Policies

Least Provilege

Techniques

Discretionary

Mandatory

Types of controls

Identification and Authentication

Network Access Control

Decentralised/distributed access control

Authorisation (privilege)

Accountability and monitoring

Correction

Audit trails

Alarms

Attacks

r

Identify, Evaluate, Respond

Brute Force

Dictionary

Denial of Service

Testing

r

Design, Coordinate, Evaluate

Penetration

Vulnerability