Access Control
In this chapter, we will:
- Introduce physical security threats and provide adequate solutions.
- Define identification vs. authentication.
- Learn authentication mechanisms and examples. How can we authenticate a user?
- Analyze the important role of Biometrics (and its dangers) in authentication.
- Define authorization and discuss access control models.