StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

CIS212 U3 Discussion - Essay Example

Cite this document
Summary
Access control tools are concerned with determining the allowed activities of legitimate users, mediating between every attempt by a user to access a particular resource in the system. Its main objective is to make sure that undesired users do not get access to certain…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.3% of users find it useful
CIS212 U3 Discussion
Read Text Preview

Extract of sample "CIS212 U3 Discussion"

How Users Access and Logon to Systems Access control tools are concerned with determining the allowed activities of legitimate users, mediating between every attempt by a user to access a particular resource in the system. Its main objective is to make sure that undesired users do not get access to certain information; only those who are allowed can access. Role-based access control and Discretionary Access Control both are based on defining the roles and adding each user to the system. Authorization and privileges are granted.

The main difference between these two user control assets is that RBAC has ease of management while DAC is complicated since each new user has to go through all the details the user needs access to and add them to the list.Authentication provides a way of identifying a user by having them enter a valid username and password before access is granted. If the identifications do not match, authentication fails hence permission is denied to access the information. Its purpose is to prevent unauthorized users to access information that they are not entitled to access.

Certificates provide secure communications across untrusted of vulnerable networks. They are important in securing wireless local area networks. One of the advantages of using certificates is that it ensures that any data sent online is read by only the intended recipients. This is because for that data to reach the recipients, it might have to pass through multiple computers. It also improves customer’s trust. One of the disadvantages of using certificates is that it makes the connections to slow down.

Getting certificates for a business can be expensive since the service providers have to pay for its maintenances; therefore it might be viable for small scale businesses.ReferencesLaplante, P. (2001). Dictionary of computer science, engineering, and technology. Boca Raton, FL: CRC Press.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“CIS212 U3 Discussion Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1690607-cis212-u3-discussion
(CIS212 U3 Discussion Essay Example | Topics and Well Written Essays - 250 Words)
https://studentshare.org/information-technology/1690607-cis212-u3-discussion.
“CIS212 U3 Discussion Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1690607-cis212-u3-discussion.
  • Cited: 0 times

CHECK THESE SAMPLES OF CIS212 U3 Discussion

Effects of Smoking to People

In fact, it has a culture and it is a culture.... Many expressions have been put up about smoking and they tend to benefit the subject person of the moment.... For instance, Fitzgerald (2007) rightfully expresses the value that smoking… He asserts that the enthusiasm lies in the culture of smokers....
6 Pages (1500 words) Essay

Sources work

discussion In essence, the information from the two articles has answered all the three questions effectively on smoking.... In fact, Jiloha (2014) denotes that smoking has a culture and is a culture.... Many expressions have been put up about smoking and they tend to benefit the subject person of the moment....
2 Pages (500 words) Assignment

Analyses of characteristics of bread made from chestnut flour using standard method

Gluten has several negative health impacts.... A healthier option is consumption of bread made from gluten-free chestnut flour which also adds… The project evaluated breads made from chestnut flour and combinations of chestnut flour with other flours on several grounds.... Several tests were designed and the results were evaluated....
5 Pages (1250 words) Assignment

Comparing Windows With Linux

It also concerns the ability of the filesystem to be increased or reduced and limitations that come with it (Basta, 2013).... We also consider its compatibility with a majority of the other… It is also vital to consider the length of its fsck which determines whether it's or not journalized. I use exFAT filesystem because it saves me the time of having to format the drive when shifting from the two operating systems I use i....
1 Pages (250 words) Coursework

CIS204 U4 Discussion

These areas might be spread out across wide geographical locations.... WANs can also be used to create connections between smaller networks such as LANs and MANs (Edraw 2015).... For the… The most recommended technology would be the Virtual Private Network, since it fits the organizational needs and the budget as well. VPNs are Establishing a Wide Area Network (WAN) for a Resort al Affiliation Establishing a Wide Area Network (WAN) for a Resort IntroductionWide Area Networks (WAN) are computer networks used to develop connections between several areas....
1 Pages (250 words) Coursework

CIS212 U1 Discussion

It is inclusive of how the security controls are.... It has to be in a manner that advances the security and integrity of the data in the… It also ensures that users are not services that should be available at all times.... Testing will ensure a smooth operation and prevent attacks that take advantage of obsolete concepts....
1 Pages (250 words) Essay

CIS126 U1 Discussion 2 - 1

The evolving nature of Object Technology has caused many companies to reexamine their legacy codes to ensure that it matches it.... The… In the recent years, some languages like C++ and Java have considerably advanced in the use of Object Technology. Despite the many benefits that object technology poses, its The Dark Side of Object Technology Insert Insert Object technology became prevalent in industrial languages as from 80's but became established in other languages like Java and UML in the 90s....
1 Pages (250 words) Essay

CIS256 U3 Discussion

These names represent the names of particular hosts.... When the domain name is said to be fully qualified, it means that the hostname is a… For instance, gendersoft.... omain.... om. I would prefer Microsoft domain name service as compared to BIND DNS.... The reasons for this include the centrality of access to the role as a part of the Windows server package (Minasi, 2014)....
1 Pages (250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us