Access Controls - Coursework Example

Comments (0) Cite this document
Commerce, transactions, and work is conducted through the internet and technology. Leaving contemporary ways also results in more vulnerabilities with new…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.7% of users find it useful
Access Controls
Read TextPreview

Extract of sample "Access Controls"

Develop a 2 page paper defining access controls.  As society progresses to 21st security, the concept of security becomes a critical element in a very advanced world. Commerce, transactions, and work is conducted through the internet and technology. Leaving contemporary ways also results in more vulnerabilities with new technologies. This paper will discuss the many facets of protecting these vulnerabilities against large-scale attacks and discuss many facets of access controls. One of the access control is physical access. Physical access is pivotal because it is the first level of define. One great example is a mechanical lock that acts as a defense mechanism. As a matter of fact, intelligent readers are one of the most crucial elements that provide all the inputs to control physical security. With the advent of security, these card readers can make independent access decisions. With the innovation of IP, remote access can be even granted.
Access controls have created a new generation of security in many ways for organizations. Companies no longer have to rely on traditional methods of people or physical locks to achieve security. One of the many key elements of access controls is embedding authentication. AUP are set of standard and guidelines that are established by a user domain setting. AUP allows logical guidelines to ensure that audit practices are being conducted and risks are being controlled. AUP are extremely important component of framework of security policies because it dictates policies. AUP must be clear and concise in user domain. One of the most prominent factors of AUP is to ensure that user domains are separated by segregation of duties.
It is crucial to understand that utilizing AUP allows suspension of user domains from an administrator standpoint. Accounts can be suspended, given limited access, administration rights to install programs, etc. Moreover, AUP encompasses managing passwords, software licenses, noncompliance consequences, and escalations. NIST is also very proactive in promoting administrator rights and segregation of duties. When administrator rights are breached or abused, PAA level agreements are crucial that are enabled to enhance accountability of user rights. It is clear that the PAA is a written, explicit agreement that a user must acknowledge to. The PAA allows the security team to generally have a contingency plan, audit in timely manner. The PAA is a typically a two page document between administration and organization. Security Assessment Policy is a governing legislation that outlines Information Security policies, employee orientation, security incidents and plans for new and existing users. It allows users to understand and analyze the security awareness level and avoid any future mishaps that will disrupt business flows.
Credentials is also a huge element that plays a vital role in access controls. Credentials allow personnel to be granted access in any given environment. Each user must provide correct credentials to ensure they are given to allow usage. . As a matter of fact, segregation of duties are also applied here. One of the most critical elements that mitigate this risk is segregation of duties. Hence, segregation of duties is also associated with IT Internal control in which one user does not have all the power to direct these. Segregation of duties and credentials act as a supplement to differentiate users in any given environment. In a user domain, access control rights may act as buffers or give transfer rights. This when a user can have these rights can pass copies of rights to other uses. In the computing world, it often called hierarchy methods.
Best Practices for the Security APIs. (n.d.). (Windows). Retrieved February 25, 2014, from
Johnson, R. (2011). Security policies and implementation issues. Sudbury, Mass.: Jones & Bartlett Learning.
RQ News & Blog. (n.d.). ReliaQuest. Retrieved February 25, 2014, from
Tipton, H. F., & Krause, M. (2005). Information security management handbook (5th ed.). London: Taylor & Francis e-Library.
Windows Azure Load Balancing: What To Know. (n.d.). InformationWeek. Retrieved February 24, 2014, from
Tipton, H. F., & Krause, M. (2005). Information security management handbook (5th ed.). London: Taylor & Francis e-Library. Read More
Cite this document
  • APA
  • MLA
(“Access Controls Coursework Example | Topics and Well Written Essays - 500 words”, n.d.)
Access Controls Coursework Example | Topics and Well Written Essays - 500 words. Retrieved from
(Access Controls Coursework Example | Topics and Well Written Essays - 500 Words)
Access Controls Coursework Example | Topics and Well Written Essays - 500 Words.
“Access Controls Coursework Example | Topics and Well Written Essays - 500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document


Internal Controls

...? Internal Controls of the of the Internal Controls Introduction The assignment at hand relates to a review of the internal accounting controls for the collections made at weekly services at a Church. I have been asked to serve on a three-person audit team- the other members comprising the internal auditor and a CPA who has just joined. I have to indicate the weaknesses in internal accounting controls in the handling of collections. Discussion The first thing I would recommend is that an audit of the Church’s financial records be undertaken. It is preposterous that no audit has been made in recent years because the same trusted employee has kept both the Church records as well as served as Financial Secretary for the last 15 years... ...
1 Pages(250 words)Essay

Johnson Controls

...Johnson Controls The process of analyzing and selecting various proposals for capital investments is called capital budgeting. Capital budgeting models are one of several techniques used to measure the value of investing in long-term capital investment projects. Firms invest in capital projects to expand production to meet anticipated demand or to modernize production equipment to reduce costs (Emery et al., 2007). Capital investment can also be made for many noneconomic reasons, such as installing pollution control equipment, converting to a human resources database to meet some government regulations, or satisfying non-market public demands. Information systems are also considered long-term capital...
5 Pages(1250 words)Research Paper

Internal Controls

...?It is important for companies to safeguard the assets and inventory of the firm. Business owners and managers have to protect themselves against internal and external threats. The employees of the company posed an internal threat to the company (Goulding, 2011). A lot of employees steal from businesses whenever they assess that the company does not have any measures to prevent the unethical action of theft. A way for companies to protect the assets of the company is by implementing internal controls. The asset that must be protected the most due to its liquidity is the cash of the company. Cash is the most important asset of a company due the fact it can be used to pay for the purchases, payroll, and debt obligation of a...
4 Pages(1000 words)Assignment


...Control Executive summary This company has been dealing in the sales of cereals for over ten years and has met many challenges of which some have influenced its performance both positively and negatively. For years now, the company has been complaining of the over-weight of boxes that needed a quality analyst’s report and advise Based on the weight of the cereal boxes (Konrad, 2006). This paper is therefore detailed to provide a statistical analyst report based on the based on the weight of the cereal boxes. It is also to give the control limit of the cereal boxes and appropriate measures if the control limits are not applicable. Organizational report There are certain risks, threats and challenges that a company may be faced... with and...
2 Pages(500 words)Essay

How does physical access control differ from logical access control as described in earlier chapters How is it similar

...Difference and Similarity between Physical Access Control and Logical Access Control Introduction: With respect to the computerinformation systems, the policies, processes and the technical controls that are involved are referred as the logical access controls. On the other hand, the control of the physical access is performed through the physical access control (Logical access, physical access, 2012). Logical Access Control and Physical Access Control:...
1 Pages(250 words)Essay

Access Control and Policies

...Access Controls and Policies Access Controls and Policies Access control involves the mediation of whether certain data and resources can be attained by persons. The request to attain this data and resources requires that information about an individual be disclosed. There are regulations that permit the attainment of data and resources through software, and security policies. Corporations try to protect their clients through these policies, hence; existence of policies on a large scale network (Benantar, 2005). This paper will review advantages and disadvantages of the access control models present. It...
2 Pages(500 words)Assignment

Project Controls

...Project Controls Insert Insert Grade Insert Project management best practice requires that there is an appropriate plan for control of unfocused challenges (Roberts, 2011). In line with this requirement, this paper addresses the various changes that may be necessary during project implementation. Having gone through the necessary procedures and steps for the establishment of the planned server upgrade, it is important that issues that may crop up during the execution phase be adequately addressed. This will go a long way in ensuring that the history of project failures in the past affected by inflated budgets, extended timelines and wastage of resources among others is not repeated in the planned project....
2 Pages(500 words)Essay

Security and Privacy Controls for Federal Information Systems

...3.1 Access controlAccess control is a security control family that consists of security controls denoted by the identifier AC and range from AC-1 to AC-22. This control family falls under the technical class due to its characteristics. Access control policy and procedures (AC-1) is a control that is intended to produce the policy and procedures required in order to effectively implement the selected controls and control enhancements in the access control family. 3.1.2 Security control...
4 Pages(1000 words)Essay

Internal Controls

...SONY: Internal Control According to Gilbert, Martin 2004, pp.306, internal control is a process for assuring achievement of anorganizations objectives, operational efficiency and effectiveness, dependable financial reporting, and compliance with regulations, laws and policies. In the case of SONY, some of the aforementioned roles of internal controls have not been achieved as a result of various internal control weaknesses and deficiencies. In the recent story carried by the New York Times, the corporation is at a very high risk of incurring huge losses if measures are not taken to protect the gains that the company has made. Significantly, the company has been marred...
1 Pages(250 words)Essay


...Statistical quality control Statistical quality control scenario Control limits Upper control limit = 6.33 + (0.06/ (3)1/2) = 6.43 Lower control limit = 6.33 - (0.06/ (3)1/2) = 6.23 The control for the weight of the boxes is not bad off . Each set has three boxes, the first two boxes have weight that are within the weight limit of 6.2 and 6.4 ounces, but the third box to be added to complete the set exceed the limit. This therefore, means the company suffers a loss for those ounces supplied to their clients that have not been paid for. From the X-chart, it can be noted the first box has the lowest weight than the other boxes followed...
2 Pages(500 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Coursework on topic Access Controls for FREE!

Contact Us