Preview

Aaa Triad

Good Essays
Open Document
Open Document
455 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Aaa Triad
First thing I had to do was figure out what the AAA triad was, after a little researching on the internet I figured out it meant; Access control, Authentication, and Accounting.
Access control manages which individual or accounts may interact with certain resources and makes the decisions on which kind of operations these individuals or accounts can perform. Access control usually uses some type of identity which may be associated with a specific individual or account. After reading about access control a little, the way I think about is, I relate it to my work. With our computers at work we have one civilian that creates files on our share drive. Well when he creates these files he have the access control to those files and decides who has access to open them and who doesn’t. Once he decides who has access then he decides which person can edit those files. This helps him security wise so he doesn’t have just a random sailor messing with his files so they don’t get deleted. Authentication is how you verify a user’s identity through the use of a shared secret (like a password), a key, or biometric measure (like a fingerprint). Again, at my work we use this as well to determine who can enter our building. When you check on board, you take your military ID and have your common access card (CAC) put in a machine which puts an access control in it allowing you to the building. Then you pick a password to type in so it will let you enter the building. Since we deal with top secret material on our top floor we only allow certain personnel in. This is a great security measure, so if someone that would want to enter our building and steal secret material they won’t be able to enter the building because their ID would not work in the door.
Accounting tracks and records the operations and activities done by the individuals or accounts while they’re active in a system or working environment. Once again, at my work, the IT department uses accounting to track our

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Finally, the system/application domain would require virtual testing of everything before any implementation, hardening of all servers, and keeping up with patches and updates regularly after testing has been completed. Some of the more efficient ways to implement better access controls in a company would start with the proper level of authorization policies including physical controls for facilities. The authorization policy would appropriate entry system access controls that specify what areas are to be locked at all times and what type of locking mechanism should be implemented. It would also include the implementation of secondary locks on specific equipment and storage cabinets…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Tipton, H. F., & Krause, M. (n.d, n.d n.d). Access Control Principles and Objectives. Retrieved November 29, 2013, from cccure.org: https://www.cccure.org/Documents/HISM/003-006.html…

    • 1902 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Scenario 1: (DAC) Discretionary Access Control. Being that the business is small and not in need of higher security measures, it would be the easiest to maintain and monitor for a small business.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Is3230 Project Description

    • 2573 Words
    • 19 Pages

    Relate how an access-control policy framework is used to define authorization and access to an…

    • 2573 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    Authentication in definition is simply proof that something is real or what it is meant to be. Public networks as well as private networks to include the internet use passwords as authentication to authorize logins. Data is required and is filtered through the password database if an effort to ensure that the user is authentic. Also, before anyone is allowed to access an organization’s intranet they must first be registered by someone that has the appropriate credentials to authorize them to gain access. There are plenty of businesses and alternative in the need of additional authentication methods and one method worthy of mentioning is the utilization of digital certificates issued and verified by a Certificate Authority or as commonly used the acronym CA.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    2. What is an Access Control List (ACL) and how is it useful in a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Good Essays

    lab 5

    • 718 Words
    • 3 Pages

    What is a Network Access Control (NAC) System? Explain its benefits in securing access control to a network.…

    • 718 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Quiz on Computers

    • 2372 Words
    • 16 Pages

    (TCO 1) _____ has a granular, inheritable access control structure that allows each folder and file to have an access control list.…

    • 2372 Words
    • 16 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Authentication: The assurance that the communicating entity is the one that it claims to be. The problem of authorization is often thought to be identical to that of authentication; many widely adopted standard security protocols, obligatory regulations, and even statutes are based on this assumption.…

    • 788 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Access control methods are a process that determines what services or company resources an employee has access to. These methods will be used to determine what an employee can and cannot access, as well as ways to make sure that all employees are being granted the correct access levels. Authentication is a process of determining whether someone or something is who or what they say they are. Authentication can be a form of determining whether an employee is actually the person that they say they are. Employees can be authenticated by being able to answer personal questions that only they would know or by providing a username and password that only the employee knows.…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Good Essays

    Consistent standards for network access and authentication are critical to the company’s information security and are often required by regulations or third-party agreements. Any user accessing the company’s computer systems has the ability to affect the security of all users of the network. An appropriate Network Access and Authentication Policy reduces the risk of a security incident by requiring consistent application of authentication and access standards across the network.…

    • 1461 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Linux Security

    • 7689 Words
    • 31 Pages

    Contents 1. Introduction 1 1.1 Problem Statement 1 1.2 What Is Security? 1 1.3 OS Protection and Security 2 1.4 Assets and their Vulnerabilities 2 1.5 Protection 3 1.6 Intruders 3 1.7 Malicious Software 3 1.8 Trusted Systems 4 1.9 Protection and Security Design Principles 4 1.10 The Unix/Linux Security Model 5 1.10.1 Properties of the Unix Superuser 5 1.10.2 The Unix Security Model — Groups 6 1.10.3 Protection For Unix Files and Directories 6 1.10.4…

    • 7689 Words
    • 31 Pages
    Powerful Essays
  • Best Essays

    Accounting is the gathering and compilation of information for decision makers – including investors, managers, lenders, public and the regulators. Accounting schemes influence performance and management and have affects on organizations, departments, and even countries. Information controlled within an accounting scheme has the influence to manipulate actions. Accounting information systems are largely strong behavioral drivers in the perspective of a corporation - where bottom line and profits are every day concerns.…

    • 3655 Words
    • 15 Pages
    Best Essays
  • Powerful Essays

    * Process of Recognising, measuring, recording (also known as transactions), disclosing and attesting to information.…

    • 2525 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Accounting notes

    • 8802 Words
    • 41 Pages

    Accounting is the process of recording, summarizing, analyzing, and interpreting financial (moneyrelated) activities to permit individuals and organizations to make informed judgments and decisions.…

    • 8802 Words
    • 41 Pages
    Powerful Essays