StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Security Access Control Methods - Assignment Example

Cite this document
Summary
These access control mechanisms protect these systems and resources from an illegal access and can be a part that takes part in evaluating the…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER99% of users find it useful
Information Security Access Control Methods
Read Text Preview

Extract of sample "Information Security Access Control Methods"

Information Security Access Control Methods of Information Security Access Control Methods Access controls: Are the methods that applied to control the ways of communication of users and the systems with other systems and resources. These access control mechanisms protect these systems and resources from an illegal access and can be a part that takes part in evaluating the authorization level after an authentication process has effectively completed.The three important security principles are also relate to access control:IntegrityAvailabilityConfidentialitya) Managing User Access:Managing user access includes the authorization of the user to a specific resource.

The user goes through the procedure of registration. It is the initial process that authorizes the end users to establish the initial connection with the information system. Passwords are granted to the end user for accessing their accounts. User access can be managed locally or by policies defined by the organization.b) Network Access Control:It is a method of strengthening the network security by limiting the accessibility of network resources to communicating devices that fulfill with a proposed security policy.

Network Access Control method restricts the end users from accessing particular resources within the network. (Helfrich, Frahim, Santos, & White, 2007, p. 396-397) A well planned network access control strategy includes anti-threat applications like anti-viruses, intrusion detection systems, spywares prevention programs, as well as access control lists (ACLs). It also shapes the individual access to particular resources, once connected.c) Operating System Access Control:Access control for an OS establishes the process of implementing access level policies of the system’s resources satisfying the security policies of integrity, availability, and confidentiality.

This procedure authorizes processes/users to carry out certain operation different resources of the operating system. d) Cryptography It is method of securing information systems. It converts the information to some language that is only understandable by the user for whom it was ciphered. This process starts by ciphering the plain text to a cipher-text for scrambling the information into some cryptographic language. (Peltier, Peltier, & Blackley, 2005)The individual who performs the encryption and decryption is named as cryptographer.

ReferencesHelfrich, D., Frahim, J., Santos, O., & White, D. (2007). Cisco Network Admission Control. Indianapolis, Ind: Cisco. Peltier, T. R., Peltier, J., & Blackley, J. A. (2005). Information security fundamentals. Boca Raton, Fla: Auerbach Publications.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Security Access Control Methods Assignment”, n.d.)
Retrieved from https://studentshare.org/information-technology/1625695-information-security-access-control-methods
(Information Security Access Control Methods Assignment)
https://studentshare.org/information-technology/1625695-information-security-access-control-methods.
“Information Security Access Control Methods Assignment”, n.d. https://studentshare.org/information-technology/1625695-information-security-access-control-methods.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Security Access Control Methods

Considering the Most Comprehensive Method of Handling Information Security

From the paper "Considering the Most Comprehensive Method of Handling information security " it is clear that cryptography may be defined as the process by which data is transformed into a form that cannot be used by any other person except the authorised user.... This information could be detrimental to the company if it was accessed by the public hence the need for information security.... nbsp; It should be noted that software protection through virus protection or through the imposition of firewalls alone cannot be enough to solve the information security problem....
22 Pages (5500 words) Research Paper

Access Controls

One of the access control is physical access.... One of the access control is physical access.... In a user domain, access control rights may act as buffers or give transfer rights.... Security Assessment Policy is a governing legislation that outlines information security policies, employee orientation, security incidents and plans for new and existing users.... information security management handbook (5th ed....
2 Pages (500 words) Coursework

New Information Technologies

Information management in many businesses is the methods through which companies maximize the efficiency of planning, collecting, organizing, controls, stores, use, disseminates and disposes of used information.... Information management also ensures data security due the access controls and authorization levels created.... access controls can be implemented by giving particular people only write or read capabilities to the database with database administrators being given all the privileges....
4 Pages (1000 words) Assignment

Controls for Information Security

The present essay entitled "Controls for information security" concerns the way of controlling information security.... According to Romney, information security affects information systems reliability by ensuring that malicious threats do not cause downtime.... hellip; Users require accurate data that the information security must protect from loss or theft by third parties.... The other way that information security affects information systems reliability is the protection against data failure....
2 Pages (500 words) Essay

Information Security Risk and the Possible Threats to Information Security

The paper describes information security risk as any danger that may lead to the loss or damage of information.... They can be transmitted from one computer to another through various methods that include and not limited to downloading materials from infected sites on the internet and using infected removable storage devices.... The information should also be password protected so that any person with the intention of gaining unauthorized access to it would be restricted....
7 Pages (1750 words) Research Paper

The Primary Objectives of Information Security

This coursework "The Primary Objectives of information security" focuses on the objectives of the protection of information from a wide variety of threats, such as, getting accessed by unauthorized persons, disclosed, sold or destroyed, without the consent of the owner of the information.... nbsp;… information security is becoming one of the most important concerns in almost every profession and every field of life.... information security is a business issue, not just a technology issue....
6 Pages (1500 words) Coursework

Tools Used in Tightening Information Security

Hackers, intelligence bodies, criminals, business competitors, unhappy workers as well as other parties can try to infringe information security.... information security is about protection of information as well as information systems from unauthorized access, use, leak, disruption, modification, scrutiny, inspection or obliteration.... There are several tools used in tightening information security, and it includes software scans for computer viruses or that safeguard against unauthorized infringement into computer systems from the networks; password systems, encrypting the messages and databases, physical access for computers, discs, pass cards, credit cards in addition to other equipments storing sensitive data....
13 Pages (3250 words) Essay

Designing of Access Control Systems

This term paper "Designing of access control Systems" presents access control as a procedure of mediating each request to data and resources preserved by a system.... A number of vendors have created access control systems that integrate the newest methods of authentication such as biometrics and Radio Frequency Identification (RFID).... This paper describes different policies, theories, and techniques applied while designing an integrated system for access control....
8 Pages (2000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us