Access controls provide yet another common layer of physical security as an active component. Multifactor authentication through mechanical and electronic systems is a standard active security approach. This aspect is susceptible to tailgating due to inconvenience. Training requirements and access rosters are passive access control approaches.
- [Instructor] When it comes to digital access,…again the concept is the same as physical.…Digital multi-factor authentication is the same,…something the user knows, has, and is.…But it is still the same vulnerabilities.…Still can be tailgated or shoulder surfed.…Due to the frequency of authentication needs,…the concept of single sign on has become popular.…This can lead to access creep,…or if a critical account is compromised,…all of the accounts can be compromised.…
So here are the access control models.…This is a bit of a tongue-twister.…Attributed based, discretionary,…history-based, identity-based,…mandatory, organization-based,…role-based, rule-based,…oh, and there's another one called responsibility-based.…Fun stuff, hah.…
Note: This course was recorded and produced by Mentor Source, Inc. We're pleased to host this training in our library.
- Introduction to Spring
- Configuring the ApplicationContext
- Using the Spring expression language
- Configuring proxies
- Autowiring beans
- Using lifecycle methods
- Configuring beans with XML
- Understanding the initialization phases of the bean lifecycle
- Aspect-oriented programming and Spring