Cookies
Cybersecurity and Access Control
Role-Based Access Control (RBAC)
Attribute-Based Access Control (ABAC)
Identification
Authentication
Authorization
Nonrepudiation
Principle of Least Privilege
Need to Know
Layering
Diversification
Obscurity
Auditing and Monitoring
Cybersecurity Access Control Tools
Table 1.3: Advantages and potential issues of IAM systems
Attacking an IAM
Single Sign-On (SSO)
Table 1.4: Advantages and potential issues of SSO authentication
Assessing and Identifying Vulnerabilities of Systems
Vulnerability Assessment (VA)
Penetration Testing (PT)
Exploitation
Cybersecurity and Ethical Hacking
Table 1.5: Main activities performed by security professionals
Read the sentences and tick True or False.
Analyze the role of data protection in addressing data threat issues in the digital age. What are the key data protection concerns?
Evaluate the use of cookies in online tracking. How can cookies both enhance user experience and raise privacy concerns?
Analyze the significance of nonrepudiation in access control and cybersecurity.
Evaluate the principle of least privilege and its impact on access control. How does adhering to this principle reduce security risks within an organization?
Describe the role of ethical hacking in maintaining a strong cybersecurity posture. How does ethical hacking contribute to the overall security of an organization?
Outline the roles of professionalism and responsibility in ethical hacking.
Evaluate the role of white-hat hackers in conducting security audits and red team exercises.