StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Access Controls - Coursework Example

Cite this document
Summary
Commerce, transactions, and work is conducted through the internet and technology. Leaving contemporary ways also results in more vulnerabilities with new…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.7% of users find it useful
Access Controls
Read Text Preview

Extract of sample "Access Controls"

Develop a 2 page paper defining access controls.  As society progresses to 21st security, the concept of security becomes a critical element in a very advanced world. Commerce, transactions, and work is conducted through the internet and technology. Leaving contemporary ways also results in more vulnerabilities with new technologies. This paper will discuss the many facets of protecting these vulnerabilities against large-scale attacks and discuss many facets of access controls. One of the access control is physical access.

Physical access is pivotal because it is the first level of define. One great example is a mechanical lock that acts as a defense mechanism. As a matter of fact, intelligent readers are one of the most crucial elements that provide all the inputs to control physical security. With the advent of security, these card readers can make independent access decisions. With the innovation of IP, remote access can be even granted.Access controls have created a new generation of security in many ways for organizations.

Companies no longer have to rely on traditional methods of people or physical locks to achieve security. One of the many key elements of access controls is embedding authentication. AUP are set of standard and guidelines that are established by a user domain setting. AUP allows logical guidelines to ensure that audit practices are being conducted and risks are being controlled. AUP are extremely important component of framework of security policies because it dictates policies. AUP must be clear and concise in user domain.

One of the most prominent factors of AUP is to ensure that user domains are separated by segregation of duties. It is crucial to understand that utilizing AUP allows suspension of user domains from an administrator standpoint. Accounts can be suspended, given limited access, administration rights to install programs, etc. Moreover, AUP encompasses managing passwords, software licenses, noncompliance consequences, and escalations. NIST is also very proactive in promoting administrator rights and segregation of duties.

When administrator rights are breached or abused, PAA level agreements are crucial that are enabled to enhance accountability of user rights. It is clear that the PAA is a written, explicit agreement that a user must acknowledge to. The PAA allows the security team to generally have a contingency plan, audit in timely manner. The PAA is a typically a two page document between administration and organization. Security Assessment Policy is a governing legislation that outlines Information Security policies, employee orientation, security incidents and plans for new and existing users.

It allows users to understand and analyze the security awareness level and avoid any future mishaps that will disrupt business flows.Credentials is also a huge element that plays a vital role in access controls. Credentials allow personnel to be granted access in any given environment. Each user must provide correct credentials to ensure they are given to allow usage. . As a matter of fact, segregation of duties are also applied here. One of the most critical elements that mitigate this risk is segregation of duties.

Hence, segregation of duties is also associated with IT Internal control in which one user does not have all the power to direct these. Segregation of duties and credentials act as a supplement to differentiate users in any given environment. In a user domain, access control rights may act as buffers or give transfer rights. This when a user can have these rights can pass copies of rights to other uses. In the computing world, it often called hierarchy methods. ReferencesBest Practices for the Security APIs. (n.d.). (Windows).

Retrieved February 25, 2014, from http://msdn.microsoft.com/en-us/library/windows/desktop/ms717796(v=vs.85).aspxJohnson, R. (2011). Security policies and implementation issues. Sudbury, Mass.: Jones & Bartlett Learning.RQ News & Blog. (n.d.). ReliaQuest. Retrieved February 25, 2014, from http://www.reliaquest.com/three-steps-to-building-a-successful-security-awareness-program/Tipton, H. F., & Krause, M. (2005). Information security management handbook (5th ed.). London: Taylor & Francis e-Library.

Windows Azure Load Balancing: What To Know. (n.d.). InformationWeek. Retrieved February 24, 2014, from http://www.informationweek.com/software/enterprise-applications/windows-azure-load-balancing-what-to-know/d/d-id/899840Tipton, H. F., & Krause, M. (2005). Information security management handbook (5th ed.). London: Taylor & Francis e-Library.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Access Controls Coursework Example | Topics and Well Written Essays - 500 words”, n.d.)
Access Controls Coursework Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1672003-access-controls
(Access Controls Coursework Example | Topics and Well Written Essays - 500 Words)
Access Controls Coursework Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1672003-access-controls.
“Access Controls Coursework Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1672003-access-controls.
  • Cited: 0 times

CHECK THESE SAMPLES OF Access Controls

DBMS Support and Security

First, it should have a clear definition of organizational control objectives and have controls to meet those objectives.... It should then have feasible approaches to meet the objectives with metrics and/or benchmark standards to manage the controls.... It is also necessary to have a clear implementation of the controls and have testing and maintenance tasks while going forward.... Organizations ought to adopt security strategies, for instance, tagging data with a level of confidentiality to make sure only those permitted have access to such data (Connolly and Begg 2009)....
5 Pages (1250 words) Research Paper

Physical Access Control and Logical Access Control

With respect to the computer information systems, the policies, processes and the technical controls that are involved are referred as the logical Access Controls.... This mostly includes the access of human Difference and Similarity between Physical Access Control and Logical Access Control Introduction: With respect to the computerinformation systems, the policies, processes and the technical controls that are involved are referred as the logical Access Controls....
1 Pages (250 words) Essay

Access Control and Policies

It will Access Controls and Policies Access Controls and Policies Access control involves the mediation of whether certain data and resources can be attained by persons.... Advantages and disadvantages of the Access Controls One advantage of the Access Control Lists (ACLs) is the protection it offers users of a system.... The advantage brought on by such Access Controls helps determine who is to access data, regulate what they might, or might not do....
2 Pages (500 words) Assignment

Security and Privacy Controls for Federal Information Systems

e also developed and documented procedures to facilitate the implementation of the access control policy and associated Access Controls including risk management.... The present essay entitled "Security and Privacy controls for Federal Information Systems" dwells on the access control which is a security control family that consists of security controls denoted by the identifier AC and range from AC-1 to AC-22.... Access control policy and procedures (AC-1) is a control that is intended to produce the policy and procedures required in order to effectively implement the selected controls and control enhancements in the access control family....
4 Pages (1000 words) Essay

BOX Inc

to enhance security-Access Controls together with the tools of securing corporate data stored particularly in its cloud servers.... et Adds Enterprise Security-Access Controls to Cloud Storage.... to enhance security-Access Controls together with the tools of securing corporate data stored particularly in its cloud servers.... et Adds Enterprise-Class Security-Access Controls to Cloud Storage.... The author also elaborates that the software owner has the ability to control those who access online materials....
1 Pages (250 words) Annotated Bibliography

System Security Planning: the Configuration of the System

Implementation of effective logical Access Controls, an organization significantly reduces the risks to the system environment.... Some logical Access Controls that have been incorporated into the system include assignment of access privileges, object re-use, session controls, re-certification of users, encryption, networking, dial-in, as well as the use of warning banners.... The core of an access-control system aims at securing evaluation of whether an established identity can access a particular computing resource, which is also called an object....
5 Pages (1250 words) Research Paper

Operating Systems - Hardening and Security

As a Security professional hired by NextGard technologies to help provide their windows security implementation model for their organization, I will recommend a number of changes in the organization's current network system some of which include the adoption of appropriate Microsoft Windows Access Controls, use of cryptography methods as well as a number of prevention techniques and countermeasures for thwarting the risks posed by malicious codes such as worms, viruses, and Trojan horses among other related malicious codes....
8 Pages (2000 words) Case Study

Security in Computing

To achieve confidentiality, integrity, and availability, it is required to have or institute Access Controls so as to avoid unauthorized access to information resources and/or systems.... Such Access Controls come in handy to achieve confidentiality or privacy (preventing unauthorized disclosure or access to information) and integrity (preventing unauthorized modification of information).... According to Gollmann (2010), Access Controls encompasses; instituting security policies (whereby principals are allowed to access specific resources), authentication of information accessed or supplied with an access request, and evaluation of access request in regard to a given security policy....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us