Access Controls

How Can We Securely Access Systems and Data?
Published

November 11, 2024

Exploration

Activities

  • Monday: Laboratory session
  • Tuesday and Thursday: Security Solutions
    • Understand the trade-offs in approaches to access control
    • Develop more insights into multi-factor authentication
    • Explore strategies to authentication and authorization
    • Discover how an operating system plays a critical role in security
    • Continued highlighting of the concept of a “security synapse”
    • Student presentations that feature:
      • Explanation of a high-level concepts behind access control
      • In-class activity that connects concepts to real-world scenarios
      • Hands-on examples of the operation and behavior of access control methods
      • Demonstrate the use of a practical approach to access control

Slides

Full Screen: Week Twelve: Security Solutions

Back to top