Skip to main content
  • Courses
  • Programs
  • Help
    Getting Started Discussion Forums Help Center & FAQ
Saylor Academy
  • Log in or Sign up
Courses
Programs
Help
Getting Started
Discussion Forums
Help Center & FAQ
  • CS406: Information Security (2018)
  • Announcements
  • Sections
  • Course Introduction
  • Unit 1: Computer Security Concepts
  • Unit 2: Basic Cryptographic Concepts
  • Unit 3: Public-Key Encryption
  • Unit 4: Access Control Mechanisms
  • Unit 5: Security Solutions
  • Unit 6: Firewalls, Intrusion Detection, and Intrusion Prevention
  • Unit 7: Physical Security
  • Unit 8: Malicious Software and Software Security
  • Unit 9: Security Risk Management
  • Final Exam
  • Resources
  • Activities
  • Forums
  • Quizzes
  • Home
  • About Saylor Academy
  • Blog
  • Credit University Partners

CS406: Information Security (2018)

  1. Home
  2. Courses
  3. (hidden)
  4. CS406: Information Security (2018)
  5. Sections
  6. Unit 4: Access Control Mechanisms

Learn new skills or earn credit towards a degree at your own pace with no deadlines, using free courses from Saylor Academy. We're committed to removing barriers to education and helping you build essential skills to advance your career goals. Start learning here, or check out our full course catalog.

Log in or Sign up to enroll in courses, track your progress, gain access to final exams, and get a free certificate of completion!

Sign up now
Back to course 'CS406: Information Security (2018)'
  • Unit 4: Access Control Mechanisms

    Access control is a system that enables an authority to control access to areas and resources in a given physical facility or computer-based information system. In this unit, we will explore the access control mechanisms for user authorization. By the means of access control, appropriate authorization to information is provided to different entities in an organization. The common mechanisms include discretionary access control (DAC) and role-based access control (RBAC). We look into each of these in the context of their current usage in a typical enterprise.

    Completing this unit should take you approximately 7 hours.

    • Unit 4 Learning Outcomes Page
    • 4.1: Authentication

      • Open Web Application Security Project: "Authentication" URL

        Read this chapter about authentication, a process of determining if a user or entity is who he/she claims to be.

    • 4.2: Access Control and Authorization

      • Open Web Application Security Project: "Access Control and Authorization" URL

        Read this chapter about discretionary access control (DAC) and role-based access control (RBAC), a technical means for controlling access to computer resources.

    • 4.3: Role-Based Access Control

      • National Institute of Standards and Technology: "An Introduction to Role-Based Access Control" URL

        Read this page about role-based access control (RBAC), a technical means for controlling access to computer resources.

    • 4.4: Role-Based Access Control and Role Graph Model

      • Purdue University: Sylvia Osborn's "The Role Graph Model and Its Extensions" Page

        Watch this video about techniques used in context of Role-Based Access Control mechanism.

Saylor Academy
  • About

  • Partners

  • Blog

  • Contact

Saylor Academy

© Saylor Academy 2010-2022 except as otherwise noted. Excluding course final exams, content authored by Saylor Academy is available under a Creative Commons Attribution 3.0 Unported license. Third-party materials are the copyright of their respective owners and shared under various licenses. See detailed licensing information.

Saylor Academy®, Saylor.org®, and Harnessing Technology to Make Education Free® are trade names of the Constitution Foundation, a 501(c)(3) organization through which our educational activities are conducted.

"CCBY"

Sitemap | Terms of Use | Privacy Policy

Data retention summary
Get the mobile app
Policies