Preview

Access Control Policy

Good Essays
Open Document
Open Document
703 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Access Control Policy
Associate Level Material
Appendix F

Access Control Policy

Student Name:

University of Phoenix

IT/244 Intro to IT Security

Instructor’s Name:

Date: December 9, 2012

Access Control Policy

Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems

1 Authentication

Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.

An authentication process establishes the identity of some entity under scrutiny. On the Internet, authentication is somewhat more complex. Network entities do not typically have physical access to the parties they are authenticating. Malicious users or programs may attempt to obtain sensitive information, disrupt service, or forge data by impersonating valid entities. Distinguishing these malicious parties from valid entities is the role of authentication, and is a vital role in network security.

2 Access control strategy

1 Discretionary access control

Describe how and why discretionary access control will be used. Include an explanation of how the principle of least privilege applies to assure confidentiality. Explain who the information owner is that has the responsibility for the information and has the discretion to dictate access to that information.

Discretionary access says that the information owner is overall responsible for the information stored on the server. This job could be delegated out amongst teams or could be owned by a CEO or Vice President of a company.

2 Mandatory access control

Describe how and why mandatory access control will be used.

Subjects and objects each have a set of security attributes. Whenever a subject attempts to



References: Cite all your references by adding the pertinent information to this section by following this example. Merkow, M., & Breithaupt, J. (2006). Information Security: Principles and Practices. Upper Saddle, NJ: Prentice Hall. Rouse, M. (June 2007). authentication. Retrieved from http://http://searchsecurity.techtarget.com/definition/authentication Techotopia. (July 20, 2009). Mandatory, Discretionary, Role and Rule Based Access Control. Retrieved from http://http://www.techotopia.com/index.php/Mandatory,_Discretionary,_Role_and_Rule_Based_Access_Control

You May Also Find These Documents Helpful

  • Powerful Essays

    Sandhu, R., & Samarati, P. (1996). Authentication, access control, and audit. ACM Computing Surveys (CSUR), 28(1), 241-243.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    AIS Review Sheet

    • 2832 Words
    • 12 Pages

    This network access control determines which IP packets are allowed entry to a network and which are dropped.…

    • 2832 Words
    • 12 Pages
    Powerful Essays
  • Better Essays

    User accounts and passwords are implemented to maintain individual accountability for network resource usage. Any user who obtains an account and password for accessing a Corporation Tech provided resource, is required to keep these credentials confidential. Users of these systems may only use the accounts and passwords for which they have been assigned and authorized to use, and are prohibited from using the network to access these systems through any other means. This plan also prohibits the sharing of personal user accounts or passwords for accessing Corporation Tech or…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    With the advances in technology, authentication has become part of our everyday lives, whether scanning your badge at work, signing for a credit card purchase, or logging into your Facebook/Twitter accounts. Authentication is the act of validating your identity while requesting access to software, purchases, or entry to a secured facility. There are four types of authentication; something you know, something you have, something you are, and something you can produce. When a service requests two or more types of authentication, it is called strong authentication, such as inserting an identification card and providing a password to access a computer workstation.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    07: Password and Ref

    • 4381 Words
    • 33 Pages

    Authentication is the process of ensuring that the individuals trying to access the system are who they claim to be.…

    • 4381 Words
    • 33 Pages
    Satisfactory Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Good Essays

    LAB 3

    • 368 Words
    • 2 Pages

    6. Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls achieve CIA for departmental LANs departmental folders, and data.…

    • 368 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Tipton, H. F., & Krause, M. (n.d, n.d n.d). Access Control Principles and Objectives. Retrieved November 29, 2013, from cccure.org: https://www.cccure.org/Documents/HISM/003-006.html…

    • 1902 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    In this lab, you followed the Microsoft approach to securing the CIA triad. You created new user…

    • 506 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Lab 3 nt2580

    • 321 Words
    • 2 Pages

    . What are the three fundamental elements of an effective access control solution for information…

    • 321 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Kudler Security Report

    • 8349 Words
    • 34 Pages

    8. Access control: Focuses on business requirement for access control, user access management, user responsibilities, network access control, operating system access control, application and information access control, and mobile computing and teleworking…

    • 8349 Words
    • 34 Pages
    Powerful Essays
  • Satisfactory Essays

    Jennifer works in the Sales Department by day and part-time as the evening accounts payable clerk with credit memo privileges to correct customer orders. Jennifer is a valuable asset for the organization. Since she joined the accounts payable department, the late payment rate has dropped by 20 percent while the warehouse-shipping rate increased by 10 percent, and the overall profit has increased by a modest amount of 0.005 percent for the first reporting period.…

    • 1078 Words
    • 7 Pages
    Satisfactory Essays
  • Better Essays

    Stallings, W., & Brown, L. (2012) Computer security: Principles and practice (2nd ed.). Boston, MA: Pearson.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Information security is the protection of information against accidental or malicious disclosure, modification or destruction. Information is an important, valuable asset of IDI which must be managed with care. All information has a value to IDI. However, not all of this information has an equal value or requires the same level of protection. Access controls are put in place to protect information by controlling who has the rights to use different information resources and by guarding against unauthorised use. Formal procedures must control how access to information is granted and how such access is changed. This policy also mandates a standard for the creation of strong passwords, their protection and frequency of change.…

    • 1356 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Chapter 9 ISS

    • 620 Words
    • 3 Pages

    9 True or False: Access control is a mechanism for accomplishing confidentiality, integrity, authentication, and nonrepudiation.…

    • 620 Words
    • 3 Pages
    Good Essays