Page 162 - CISSO_Prep_ Guide
P. 162

Other Methods of Defeating Access Controls

            Access controls can also be defeated through gaining physical
            access to network cabling, network devices, or servers; through
            exploiting a vulnerability such as SQL injection or planting a
            rootkit on a system.



            Summary of Authentication and Access Controls
            This is a critically important domain, and many-core principles
            and concepts were covered in this domain. The security
            professional should be familiar with Identification,
            Authentication, Authorization and Accounting, role-based
   157   158   159   160   161   162   163   164   165   166   167