Network Security and Defense

  1. Access Control and Authentication
    1. Access Control Models
      1. Discretionary Access Control
        1. Owner-Based Permissions
          1. Access Control Lists
            1. Permission Inheritance
              1. Security Limitations
              2. Mandatory Access Control
                1. Security Label Systems
                  1. Clearance Levels
                    1. Information Classification
                      1. Bell-LaPadula Model
                      2. Role-Based Access Control
                        1. Role Definition
                          1. Permission Assignment
                            1. Role Hierarchy
                              1. Separation of Duties
                              2. Attribute-Based Access Control
                                1. Dynamic Authorization
                                  1. Policy-Based Decisions
                                    1. Context-Aware Access
                                  2. Authentication Factors
                                    1. Knowledge-Based Authentication
                                      1. Password Security
                                        1. Passphrase Implementation
                                          1. PIN Systems
                                            1. Security Questions
                                            2. Possession-Based Authentication
                                              1. Hardware Tokens
                                                1. Smart Card Technology
                                                  1. Mobile Device Authentication
                                                    1. One-Time Password Systems
                                                    2. Inherence-Based Authentication
                                                      1. Fingerprint Recognition
                                                        1. Facial Recognition Systems
                                                          1. Iris Scanning Technology
                                                            1. Voice Recognition
                                                              1. Behavioral Biometrics
                                                            2. Multi-Factor Authentication
                                                              1. MFA Implementation Strategies
                                                                1. Two-Factor Authentication
                                                                  1. Three-Factor Authentication
                                                                    1. Adaptive Authentication
                                                                    2. MFA Technologies
                                                                      1. SMS-Based Authentication
                                                                        1. Mobile App Authentication
                                                                          1. Hardware Token Integration
                                                                            1. Biometric Integration
                                                                          2. Centralized Authentication Systems
                                                                            1. RADIUS Protocol
                                                                              1. Authentication Process
                                                                                1. Accounting Functions
                                                                                  1. Authorization Services
                                                                                    1. Proxy and Relay Functions
                                                                                    2. TACACS+ Implementation
                                                                                      1. Authentication Separation
                                                                                        1. Command Authorization
                                                                                          1. Accounting Granularity
                                                                                            1. Encryption Features
                                                                                            2. Kerberos Authentication
                                                                                              1. Ticket Granting Ticket
                                                                                                1. Service Ticket Process
                                                                                                  1. Key Distribution Center
                                                                                                    1. Single Sign-On Integration