StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Access Control and Policies - Assignment Example

Cite this document
Summary
The request to attain this data and resources requires that information about an individual be disclosed. There are regulations that permit the attainment of data and…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.3% of users find it useful
Access Control and Policies
Read Text Preview

Extract of sample "Access Control and Policies"

Access Controls and Policies Access Controls and Policies Access control involves the mediation of whether certain data and resources can be attained by persons. The request to attain this data and resources requires that information about an individual be disclosed. There are regulations that permit the attainment of data and resources through software, and security policies. Corporations try to protect their clients through these policies, hence; existence of policies on a large scale network (Benantar, 2005).

This paper will review advantages and disadvantages of the access control models present. It will examine how policies in corporations maintain their business activities without running too many risks. Advantages and disadvantages of the access controls One advantage of the Access Control Lists (ACLs) is the protection it offers users of a system. The Mandatory Access Control (MAC), for example, is a policy that is mandatory in every system present. It requires that users are offered access based on mandated guidelines.

The Role Based Access Control (RBAC) controls access depending on the role played by system users (Kuhn, 2003). The advantage brought on by such access controls helps determine who is to access data, regulate what they might, or might not do. The ACLs provide an exceptional method of accessing data and resources. Disadvantages brought on by the use of ACLs are immense. One of them includes the difficulty involved in maintaining the ACLs in an environment where there is a large number of users.

They are also error-prone and do not offer assurance on the protection of confidential information. This is once there is a need to change, or delete ACLs on individual files. These challenges make it particularly hard for system users to trust ACLs entirely (Bertino & Ghinita, 2011).Topic 1 The organization of information resources would be in such a manner that there is one system to access. The use of the RBAC is crucial in the arrangement of such information. It is an exceptional tool to use since it will recognize internal and external users of that system.

People, therefore, can carry out their responsibilities without too much struggle. They would be assigned unique codes that grant them access to the system (Gofman, 2008).Topic 2 Discretionary policies in any system create the possibility of what one can access, and how they can use that information. If there is any threat of damage of data, there are software systems created to raise an alarm. The Biba Integrity Model is a security system that ensures problems associated with damaging of information are dealt with accordingly.

The protection of information is crucial to any system and its users, and this model can help in getting individuals the information they need (Gowadia, 2007).Topic 3 To ensure that information in a system is accurate, there is the use of models such as the Bell-Lapadula Model. This model is used in many areas in the world today, such as the military. Its main use is to regulate the flow of information to would-be users of information and data (Kelley & Campagna, 2009). This security model should be made known worldwide to ensure the prevention of tampering with information in systems.

ReferencesBenantar, M. (2005). Access control systems: Security, identity, management and trust models. Oxford: Oxford University Press.Bertino, E., & Ghinita, G. (2011). Access control for databases: Concepts and systems. Oxford: Hart Publishing.Gofman, M. I. (2008). Efficient policy analysis for administrative role based access control. New York: PULP.Gowadia, V. (2007). Policy models for compliance checking and XML access control. Cambridge: Cambridge University Press.Kelley, J., & Campagna, R. (2009). Network access control for dummies.

New York: Free Press.Kuhn, R. D. (2003). Role-based access control. New York: Cambridge University Press.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Access Control and Policies Assignment Example | Topics and Well Written Essays - 500 words”, n.d.)
Access Control and Policies Assignment Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1603134-access-control-and-policies
(Access Control and Policies Assignment Example | Topics and Well Written Essays - 500 Words)
Access Control and Policies Assignment Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1603134-access-control-and-policies.
“Access Control and Policies Assignment Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1603134-access-control-and-policies.
  • Cited: 0 times

CHECK THESE SAMPLES OF Access Control and Policies

Risk Management and Control Effectiveness

The execution of security controls are in compliance with the information security and privacy policies.... This paper answers seven questions in relation to effectiveness of… According to Oppliger (2003), management of information security in organizations is very vital as it ensures that the security of information is This paper answers seven questions in relation to effectiveness of security technologies and methodology, risks related to them, additional controls, and access of technology within organizations....
6 Pages (1500 words) Essay

Information Security Access Control Methods

These access control mechanisms protect these systems and resources from an illegal access and can be a part that takes part in evaluating the… Managing user access includes the authorization of the user to a specific resource.... It is the initial process that authorizes the end users to establish the Information Security access control Methods of Information Security access control Methods Access controls: Are the methods that applied to control the ways of communication of users and the systems with other systems and resources....
1 Pages (250 words) Assignment

Access Controls

One of the access control is physical access.... One of the access control is physical access.... In a user domain, access control rights may act as buffers or give transfer rights.... AUP are extremely important component of framework of security policies because it dictates policies.... Security Assessment Policy is a governing legislation that outlines Information Security policies, employee orientation, security incidents and plans for new and existing users....
2 Pages (500 words) Coursework

Building an Access Control System

The project scope will focus on the building of an access control System for the dormitories for a small college.... The operations of an access control System are aimed at being selective.... The microelectronic access control system allows access based on the permit presented on the cards.... The term access control denotes the exercise of limiting access to a building, a property, or a room to accredited persons.... Thus, for an access control system, there are a set of policies that are mandatory for configuration onto the system with an expertise and high level trusted the programmer to administrate the system....
4 Pages (1000 words) Case Study

Administrators Access Control

The writer of the paper “Administrators access control” states that The privileges and rights bestowed upon the administrators raise concerns based on their ability to access any information within the organization's network system.... Considering these propositions the issue of access control by administrators has been contentious.... Weighing both sides of the coin, the question arises, 'should access control by administrators be limited?...
10 Pages (2500 words) Coursework

Access Control Methods in Information Security

They are categorized as Mandatory Access Control, Discretionary Access Control, or Role-Based Control, depending on their access control and application level.... This paper ''access control Methods in Information Technology'' tells that access control is one of the most sensitive aspects of computer and computer systems' security.... As is evident with the masculinity of information technology as the contemporary means of capturing and storing information, access control systems must exist to protect information and information technology systems....
6 Pages (1500 words) Coursework

Tools Used in Tightening Information Security

Fundamentally, there are implemented policies for informing people on how to utilize products and on how to make sure that there is information security in the organizations.... Information security is about protection of information as well as information systems from unauthorized access, use, leak, disruption, modification, scrutiny, inspection or obliteration.... There are several tools used in tightening information security, and it includes software scans for computer viruses or that safeguard against unauthorized infringement into computer systems from the networks; password systems, encrypting the messages and databases, physical access for computers, discs, pass cards, credit cards in addition to other equipments storing sensitive data....
13 Pages (3250 words) Essay

Designing of Access Control Systems

nbsp;While developing an access control system, there are three control concepts that should be considered which include mechanisms, models, and policies.... This term paper "Designing of access control Systems" presents access control as a procedure of mediating each request to data and resources preserved by a system.... A number of vendors have created access control systems that integrate the newest methods of authentication such as biometrics and Radio Frequency Identification (RFID)....
8 Pages (2000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us