Access Controls
How Can We Securely Access Systems and Data?
Exploration
Read chapter seven in Computer Systems Security: Planning for Success Read chapter fifty-five in OSTEP
Activities
Monday: Laboratory session Tuesday and Thursday: Security Solutions - Understand the trade-offs in approaches to access control
- Develop more insights into multi-factor authentication
- Explore strategies to authentication and authorization
- Discover how an operating system plays a critical role in security
- Continued highlighting of the concept of a “security synapse”
- Student presentations that feature:
- Explanation of a high-level concepts behind access control
- In-class activity that connects concepts to real-world scenarios
- Hands-on examples of the operation and behavior of access control methods
- Demonstrate the use of a practical approach to access control