Introduction to Cybersecurity
Completion requirements
Provides a foundational overview of how to protect digital devices, networks, and data from malicious attacks and organizational cyber hygiene.
3. Computer Security & Access Control
3.1. Access Control Principles
Access control ensures only authorized users can access specific resources.
-
Authentication – Verifying identity (e.g. passwords, biometrics).
-
Authorization – Granting access based on roles or permissions.
-
Accountability – Tracking user actions through logs.
-
Least Privilege – Users get only the access they need.