How do I separate restricted information from unrestricted information?
What methods should I use to identify users who request access to restricted information?
What is the best way to permit only users I authorize to access restricted information?
Where do I start? Understand access control basics Discuss access control techniques .Recognize and compare access control models .
Contrast various identification and authentication techniques . Recognize common attacks and implement controls to prevent them.