Access Control

In this chapter, we will:

  1. Introduce physical security threats and provide adequate solutions.
  2. Define identification vs. authentication.
  3. Learn authentication mechanisms and examples. How can we authenticate a user?
  4. Analyze the important role of Biometrics (and its dangers) in authentication.
  5. Define authorization and discuss access control models.