Access Control: Difference between revisions
Jump to navigation
Jump to search
Robsteinde (talk | contribs) No edit summary |
Robsteinde (talk | contribs) No edit summary |
||
Line 1: | Line 1: | ||
Who and what has access to which resource has to be controled on every IT System. |
Who and what has access to which resource has to be controled on every IT System. |
||
==Introduction== |
|||
'''Contents:''' |
|||
==Hardware Protection== |
|||
⚫ | |||
===Intel 80x86 (Pentium) Processors=== |
|||
*[[#Anchor][Access Control by Hardware]] |
|||
===Other Procssors=== |
|||
== Access Control by Operating System == |
|||
== General Problems of Access Control == |
|||
==Operating Systems== |
|||
===Groups and Roles=== |
|||
⚫ | |||
===Capabilities=== |
|||
===Understands=== |
|||
==Problems== |
Revision as of 13:39, 30 November 2004
Who and what has access to which resource has to be controled on every IT System.