Implementation should include
- access control models
- physical access control
- biometric factors
- tokens
- certificate-based authentication
- file system security
- database security.
Process/Skill Questions:
- What are the implications and limitations of biometric controls?
- What are the various file systems security protocols?