CISSPCertifiedInformationSystemSecurityProfessionalBezoekookonzewebsitehttp://www.enacom.nl.Opbasisvandeboeken:CISSPCertification,TrainingGuide,RobertaBraggTheCISSPPrepGuide,RonaldL.Krutz&RusselDeanVinesSamenvattingdoorJosEngelhartMScCISSPTableofContentsCISSPi1ACCESSCONTROLSYSTEMSANDMETHODOLOGY11.1AUTHENTICATIONANDACCESSCONTROL..............................................................11.2ACCOUNTABILITY..........................................................................................11.3ACCESSCONTROLTECHNIQUES.........................................................................1DiscretionaryAccessControl-DAC..............................................................1MandatoryAccessControlMAC.................................................................1Lattice-BasedAccessControl.......................................................................1Rule-BasedAccessControl..........................................................................2Role-basedaccesscontrol...........................................................................2AccessControlLists...................................................................................21.4ACCESSCONTROLADMINISTRATION...................................................................2Accountadministration...............................................................................21.5ACCESSCONTROLMODELS/STRATEGIES.............................................................3Bell-LaPadula............................................................................................3Biba.........................................................................................................3LiptnersLattice.........................................................................................4Non-inferenceModels.................................................................................41.6IDENTIFICATIONANDAUTHENTICATIONTECHNIQUES................................................4Passwor...