CISSP – Access Control – Authentication
We want to provide Access Control to networks. Subjects and Objects The network should be thought of as being made of subjects and objects. A subject is the person or device accessing something from an object. For instance a computer run by me requests a video on a NAS. I am the subject, the NAS […]