Page 162 - CISSO_Prep_ Guide
P. 162
Other Methods of Defeating Access Controls
Access controls can also be defeated through gaining physical
access to network cabling, network devices, or servers; through
exploiting a vulnerability such as SQL injection or planting a
rootkit on a system.
Summary of Authentication and Access Controls
This is a critically important domain, and many-core principles
and concepts were covered in this domain. The security
professional should be familiar with Identification,
Authentication, Authorization and Accounting, role-based