Retrieved from https://studentshare.org/information-technology/1625695-information-security-access-control-methods
https://studentshare.org/information-technology/1625695-information-security-access-control-methods.
Information Security Access Control Methods of Information Security Access Control Methods Access controls: Are the methods that applied to control the ways of communication of users and the systems with other systems and resources. These access control mechanisms protect these systems and resources from an illegal access and can be a part that takes part in evaluating the authorization level after an authentication process has effectively completed.The three important security principles are also relate to access control:IntegrityAvailabilityConfidentialitya) Managing User Access:Managing user access includes the authorization of the user to a specific resource.
The user goes through the procedure of registration. It is the initial process that authorizes the end users to establish the initial connection with the information system. Passwords are granted to the end user for accessing their accounts. User access can be managed locally or by policies defined by the organization.b) Network Access Control:It is a method of strengthening the network security by limiting the accessibility of network resources to communicating devices that fulfill with a proposed security policy.
Network Access Control method restricts the end users from accessing particular resources within the network. (Helfrich, Frahim, Santos, & White, 2007, p. 396-397) A well planned network access control strategy includes anti-threat applications like anti-viruses, intrusion detection systems, spywares prevention programs, as well as access control lists (ACLs). It also shapes the individual access to particular resources, once connected.c) Operating System Access Control:Access control for an OS establishes the process of implementing access level policies of the system’s resources satisfying the security policies of integrity, availability, and confidentiality.
This procedure authorizes processes/users to carry out certain operation different resources of the operating system. d) Cryptography It is method of securing information systems. It converts the information to some language that is only understandable by the user for whom it was ciphered. This process starts by ciphering the plain text to a cipher-text for scrambling the information into some cryptographic language. (Peltier, Peltier, & Blackley, 2005)The individual who performs the encryption and decryption is named as cryptographer.
ReferencesHelfrich, D., Frahim, J., Santos, O., & White, D. (2007). Cisco Network Admission Control. Indianapolis, Ind: Cisco. Peltier, T. R., Peltier, J., & Blackley, J. A. (2005). Information security fundamentals. Boca Raton, Fla: Auerbach Publications.
Read More