Free

CIS212 U3 Discussion - Essay Example

Comments (0) Cite this document
Summary
Access control tools are concerned with determining the allowed activities of legitimate users, mediating between every attempt by a user to access a particular resource in the system. Its main objective is to make sure that undesired users do not get access to certain…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.2% of users find it useful
CIS212 U3 Discussion
Read TextPreview

Extract of sample "CIS212 U3 Discussion"

How Users Access and Logon to Systems Access control tools are concerned with determining the allowed activities of legitimate users, mediating between every attempt by a user to access a particular resource in the system. Its main objective is to make sure that undesired users do not get access to certain information; only those who are allowed can access. Role-based access control and Discretionary Access Control both are based on defining the roles and adding each user to the system. Authorization and privileges are granted. The main difference between these two user control assets is that RBAC has ease of management while DAC is complicated since each new user has to go through all the details the user needs access to and add them to the list.
Authentication provides a way of identifying a user by having them enter a valid username and password before access is granted. If the identifications do not match, authentication fails hence permission is denied to access the information. Its purpose is to prevent unauthorized users to access information that they are not entitled to access. Certificates provide secure communications across untrusted of vulnerable networks. They are important in securing wireless local area networks. One of the advantages of using certificates is that it ensures that any data sent online is read by only the intended recipients. This is because for that data to reach the recipients, it might have to pass through multiple computers. It also improves customer’s trust. One of the disadvantages of using certificates is that it makes the connections to slow down. Getting certificates for a business can be expensive since the service providers have to pay for its maintenances; therefore it might be viable for small scale businesses.
References
Laplante, P. (2001). Dictionary of computer science, engineering, and technology. Boca Raton, FL: CRC Press. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“CIS212 U3 Discussion Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1690607-cis212-u3-discussion
(CIS212 U3 Discussion Essay Example | Topics and Well Written Essays - 250 Words)
https://studentshare.org/information-technology/1690607-cis212-u3-discussion.
“CIS212 U3 Discussion Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1690607-cis212-u3-discussion.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF CIS212 U3 Discussion

Congress U3

...?Congress U3 Introduction Separation of powers as per the U.S. Constitution gives Congress an important position as a branch of government due to it being representative of the various opinions and aspirations of the citizens of the country. This position of the U.S. Congress makes it an important and integral part of the agenda of any U.S. President, with the potential to make or break it. (1). The Congress and Obama’s Agenda The powers in a war situation clearly of the President and the Congress demonstrate the separation of powers between these two branches of government. According to the U.S. Constitution the Congress retains the power to declare was and through its control of the purse strings can bring about a...
1 Pages(250 words)Essay

MGMT458 U3 IP UPS

...MGMT458 U3 IP UPS The Internal Structure of United Parcel Service The company is the largest organization in the shipment of products in the world. The service delivery of the company is time-definite. The company involves the delivery of documents the world over. The company has expanded its operation capacity to the inclusion of supply chain services. The company’s operation has three levels of operation that include the US domestic package operation, the supply chain and freight, and internal package operations levels (Dennis, 2011). The US domestic package involves the timely delivery of documents and other forms of packages throughout the United States. Internal package involves shipments done outside the USA and it...
1 Pages(250 words)Research Paper

MGMT499 U3 DB

... Employee Grading Form of the Employee…………. Department……………………… of the Reviewer………….. Date of Review…………………. Leadership Skills Excellent (3pts) Good(2pts) Fair (1pt) Poor (0pt) Honesty Communication Skills Confidence Commitment Cooperation Interpersonal Skills Excellent (3pts) Good(2pts) Fair (1pt) Poor (0pt) Creative Thinking Diversity Encouraging Empathy Flexibility Earned Values Excellent (3pts) Good(2pts) Fair (1pt) Poor (0pt) Initiative Punctuality Work Consistency Creativity Work Quality Using the grading form displayed above, James Anderson, a supervisor with one of the companies that worked for in the past can be classified as having excellent interpersonal skills, earned values and leadership skills. On the earned values...
1 Pages(250 words)Research Paper

U3 Discussion

...AD Domain Part one A strategically designed Active Directory Group assists simplify administration and attain greatest flexibility. Nevertheless, configuring groups and assigning various group attributes is a multifaceted process that engages several steps when performed using native Active Directory tools, PowerShell, To limit this dilemma and make Group Management easier, ADManager Plus streamlines all these people’s tasks and aid one to manage groups from a centralized web console. ADManager Plus has an exclusive characteristic dedicated for Group Management that make things easier creating and managing Security and Distribution Groups in Active Directory. One can include or remove numerous group members, define various... Domain Part one...
1 Pages(250 words)Coursework

U3 Lab Reprort

...Networking Lab Activities Networking This paper seeks to illustrate the objectives of lab activities that were done during the semester and their application in the career that awaits ahead. First, it is worthy to note that these lab activities are purely networking labs. This is because they deal with various aspects routing concepts and network configurations. The main objective of these lab activities is the expose the participants to how various networking concepts have over the years been used to integrate different kinds of technologies in order to enable information exchange. Great technological advancements have been made within the last decade. One area that has been greatly impacted by these advancements... Lab Activities Networking ...
1 Pages(250 words)Lab Report

CIS206 U3 Discussion

...but its not feasible to reduce that size. Thus as a precaution it is advisable to start with a smaller size. Ext4 evolves from ext3. It has the advantage of writing in a journal before updating the file system. It has made it good in recovering from crashes. It also adds wonderful management to adjacent data in files. Its performance in reading is good. Since it is very recent, a lot of tests are still underway. Discuss some of the reasons why you feel an administrator might impose a disk quota system on a Linux server. Challenges of implementing a general quota upon all corporate users? An administrator imposes a disk quota system on a Linux server so as to distribute the disk space among the users or groups according...
1 Pages(250 words)Coursework

CIS212 U1 Discussion

...Security Management Process Insert Insert Security management entails ensuring that the integrity, confidence and consistency in theavailability of services and data in an organization. It is inclusive of how the security controls are. It has to be in a manner that advances the security and integrity of the data in the organization. It also ensures that users are not services that should be available at all times. Testing will ensure a smooth operation and prevent attacks that take advantage of obsolete concepts. Further, management of intrusions is crucial (Poulsen & LaPage, 2011). The mission is to identify and counter attacks. These should level to a situation that is accommodating to the organization at least. The preceding... Management...
1 Pages(250 words)Essay

CIS212 U1 Review

...Nuclear Plant Password Policy Insert Insert Activity 1 As an information officer, what are the information security goals that you need to keep in mind while defining the protection you shall need?(Select all that apply.) The goals are detection, prevention, and recovery 2) What are applicable forms of vulnerabilities? (select all that apply) They include improperly configured software, misuse of communication protocols and damage to Hardware 3) Detail the difference between a threat, vulnerability, and a risk. A threat is anything that poses the danger to the computer system whereas vulnerability refers to a loophole or a weakness that hackers or attackers can use to attack a system. Atheotherhandlikelihoodloss... Plant Password Policy...
1 Pages(250 words)Essay

U3 Discussion

...Using Certificates Online Insert Insert One of the advantages of using certificates is that it ensures that only the intended recipients read any data sent online. How does it actually ensure that the intended recipient only reads the data? The consideration in our case is one of SSL operating over TCP. In that implementation, protocols such as HTTP that are on higher layers remain unchanged but still provide a very safe connection. The process will involve establishing a TCP connection from the client to the server via SSL handshake (Quillen, 2012). In building the connect, the client makes some specifications like the SSL running, the cipher suites it intends to use and compression methods of choice. The server confirms... Certificates...
1 Pages(250 words)Essay

CIS256 U3 Discussion

...Domain Service Insert Insert Domain Service is a service geared to convert words that can be physically read by the human being into IP addresses (Dettmer, 2003). These names represent the names of particular hosts. When the domain name is said to be fully qualified, it means that the hostname is a summation of the hostname and the domain name. For instance, gendersoft.domain.com. I would prefer Microsoft domain name service as compared to BIND DNS. The reasons for this include the centrality of access to the role as a part of the Windows server package (Minasi, 2014). It has a feature to allow it for configuration to suit both the recursive, authoritative and hybrid modes. Further, it has a DNS zone file that facilitates... Service Insert...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic CIS212 U3 Discussion for FREE!

Contact Us