We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
 
75,052 News Articles

Download the InfoWorld Authentication and Authorization Deep Dive report

Find out how to implement authentication and authorization security controls in your company, with help from InfoWorld's expert guide

The Internet works because of trust and access control. Trust that the person poking you on Facebook is really a friend. Trust that the bank that issued your credit card will let only you or authorized employees view your account. Even the anonymous parts of the Internet can't exist without security controls that enable people to determine who has access and what they can do. Without access controls, anyone can destroy the trust value of any website -- and bring it down.

In this 11-page PDF, InfoWorld contributing editor and security expert Roger Grimes offers a short course on the topic, including clear explanations of identity, access control, and the forensics of user activity, with a special section on the latest developments. This Deep Dive will show you how to apply authentication, authorization, and accounting to your business computing infrastructure -- the right way.

Learn More

Already an Insider? Sign in

Dell XP Migration SMB
Dell XP Migration SMB
IDG UK Sites

Lytro Illum release date, price and specs: Light field camera goes 3D

IDG UK Sites

Tim Cook says Apple aims to be best, not first, hinting that iWatch is coming

IDG UK Sites

Twitter - not news

IDG UK Sites

Fun film festival trailer plays with classic movie scenes