Please enable JavaScript.
Coggle requires JavaScript to display documents.
IAM - Coggle Diagram
IAM
Identification, authentication authorization & Accountability
Authorisation
Federation
Identity as a service
Integrating Identity Services
Accountability
Identification & Authentication
Access Control Models
Discretionary
Mandatory
Role Based
Rule Based
Access Control techniques and Technologies
Constrained User Interfaces
Access Control Matrix
Content dependent access control
Context-dependent access control
Access Control Methods
Access Control Layers
Administrative Controls
Physical
Technical
Threats to access controls
Dictionary Attacks
Brute Force Attacks
Spoofing at logon
Phishing & pharming
Security Principles
**Availability
Integrity
Confidentiality
Access Control Administration
Centralised
Decentralized
Access Control Monitorin
g
IDS
IPS
Access control practises