Introduction
- This is chapter 2.
- You should read it.
- They call this chapter a "toolbox".
- The chapter discuses three basic tools of security.
- Authentication : proving that a person or process is who/what they say that they are.
- Access Control: controlling who/what has access to assets.
- Cryptography: concealing data.
- Each of these are part of the cybersecurity picture.
- They state that these are universal and timeless.
- Remember in the last chapter they discussed an access control policy as who has access to what and how.
- The above tools are essential for to implement this.
- By the way, this could also be who does not have access to what.