Wednesday, September 11, 2019
Information Security Access Control Methods Assignment
Information Security Access Control Methods - Assignment Example Passwords are granted to the end user for accessing their accounts. User access can be managed locally or by policies defined by the organization. It is a method of strengthening the network security by limiting the accessibility of network resources to communicating devices that fulfill with a proposed security policy. Network Access Control method restricts the end users from accessing particular resources within the network. (Helfrich, Frahim, Santos, & White, 2007, p. 396-397) A well planned network access control strategy includes anti-threat applications like anti-viruses, intrusion detection systems, spywares prevention programs, as well as access control lists (ACLs). It also shapes the individual access to particular resources, once connected. Access control for an OS establishes the process of implementing access level policies of the systemââ¬â¢s resources satisfying the security policies of integrity, availability, and confidentiality. This procedure authorizes processes/users to carry out certain operation different resources of the operating system. It is method of securing information systems. It converts the information to some language that is only understandable by the user for whom it was ciphered. This process starts by ciphering the plain text to a cipher-text for scrambling the information into some cryptographic language. (Peltier, Peltier, & Blackley, 2005)The individual who performs the encryption and decryption is named as
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.