Securing Access Control
A major role of an organization’s CISO, CSO, and CISSP is to protect the organization’s assets. This section will discuss important concepts for protecting object access, and where to apply these access controls for the best cybersecurity protection.
Securing Data and Information
Securing data starts with user authorization and identity protection. This data, or assets, can be accessed by individuals through either technical or physical systems. Examples of physical systems include doorways, and displaying an identification badge to a guard before parking your car or entering a building.
Technical systems, on the other hand, are those that require a login name and password such as a computer, network-based router, or application. Access control systems are managed through either a centralized system such as Lightweight Directory Access Protocol (LDAP) or active directory, or a decentralized system where owners manage their own systems...