Preview

Aaa Triad

Good Essays
Open Document
Open Document
455 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Aaa Triad
First thing I had to do was figure out what the AAA triad was, after a little researching on the internet I figured out it meant; Access control, Authentication, and Accounting.
Access control manages which individual or accounts may interact with certain resources and makes the decisions on which kind of operations these individuals or accounts can perform. Access control usually uses some type of identity which may be associated with a specific individual or account. After reading about access control a little, the way I think about is, I relate it to my work. With our computers at work we have one civilian that creates files on our share drive. Well when he creates these files he have the access control to those files and decides who has access to open them and who doesn’t. Once he decides who has access then he decides which person can edit those files. This helps him security wise so he doesn’t have just a random sailor messing with his files so they don’t get deleted. Authentication is how you verify a user’s identity through the use of a shared secret (like a password), a key, or biometric measure (like a fingerprint). Again, at my work we use this as well to determine who can enter our building. When you check on board, you take your military ID and have your common access card (CAC) put in a machine which puts an access control in it allowing you to the building. Then you pick a password to type in so it will let you enter the building. Since we deal with top secret material on our top floor we only allow certain personnel in. This is a great security measure, so if someone that would want to enter our building and steal secret material they won’t be able to enter the building because their ID would not work in the door.
Accounting tracks and records the operations and activities done by the individuals or accounts while they’re active in a system or working environment. Once again, at my work, the IT department uses accounting to track our

You May Also Find These Documents Helpful

  • Satisfactory Essays

    within the facility, and training goals on the recognition and prevention of social engineering attacks. Authorization policies will also include access controls for data by specifying which data should be encrypted, they would…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    b) Access control lists (ACL): Include restrictions on inbound and outbound connections, as well as connections between LAN segments internal to the site/enclave.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Scenario 1: (DAC) Discretionary Access Control. Being that the business is small and not in need of higher security measures, it would be the easiest to maintain and monitor for a small business.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    During operation, the system uses the access control rules to decide whether access requests consumers shall be approved or disapproved. Resources include individual files or items data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer programs and other devices on the…

    • 711 Words
    • 3 Pages
    Good Essays
  • Good Essays

    access control entry (ACE)/ An entry in an object’s access control list (ACL) that grants permissions to a user or group. Each ACE consists of a security principal (the name of the user, group or computer being granted the permissions) and the specific permissions assigned to that security principal. When you manage permissions in any of the Windows Server 2008 permission systems, you are creating and modifying the ACEs in an ACL.…

    • 4603 Words
    • 19 Pages
    Good Essays
  • Powerful Essays

    Is3230 Project Description

    • 2573 Words
    • 19 Pages

    Relate how an access-control policy framework is used to define authorization and access to an…

    • 2573 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    Sandhu, R., & Samarati, P. (1996). Authentication, access control, and audit. ACM Computing Surveys (CSUR), 28(1), 241-243.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    2. What is an Access Control List (ACL) and how is it useful in a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Good Essays

    lab 5

    • 718 Words
    • 3 Pages

    What is a Network Access Control (NAC) System? Explain its benefits in securing access control to a network.…

    • 718 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Access control methods are a process that determines what services or company resources an employee has access to. These methods will be used to determine what an employee can and cannot access, as well as ways to make sure that all employees are being granted the correct access levels. Authentication is a process of determining whether someone or something is who or what they say they are. Authentication can be a form of determining whether an employee is actually the person that they say they are. Employees can be authenticated by being able to answer personal questions that only they would know or by providing a username and password that only the employee knows.…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Satisfactory Essays

    Authentication: The assurance that the communicating entity is the one that it claims to be. The problem of authorization is often thought to be identical to that of authentication; many widely adopted standard security protocols, obligatory regulations, and even statutes are based on this assumption.…

    • 788 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Consistent standards for network access and authentication are critical to the company’s information security and are often required by regulations or third-party agreements. Any user accessing the company’s computer systems has the ability to affect the security of all users of the network. An appropriate Network Access and Authentication Policy reduces the risk of a security incident by requiring consistent application of authentication and access standards across the network.…

    • 1461 Words
    • 6 Pages
    Good Essays
  • Best Essays

    Accounting is the gathering and compilation of information for decision makers – including investors, managers, lenders, public and the regulators. Accounting schemes influence performance and management and have affects on organizations, departments, and even countries. Information controlled within an accounting scheme has the influence to manipulate actions. Accounting information systems are largely strong behavioral drivers in the perspective of a corporation - where bottom line and profits are every day concerns.…

    • 3655 Words
    • 15 Pages
    Best Essays
  • Powerful Essays

    Linux Security

    • 7689 Words
    • 31 Pages

    Contents 1. Introduction 1 1.1 Problem Statement 1 1.2 What Is Security? 1 1.3 OS Protection and Security 2 1.4 Assets and their Vulnerabilities 2 1.5 Protection 3 1.6 Intruders 3 1.7 Malicious Software 3 1.8 Trusted Systems 4 1.9 Protection and Security Design Principles 4 1.10 The Unix/Linux Security Model 5 1.10.1 Properties of the Unix Superuser 5 1.10.2 The Unix Security Model — Groups 6 1.10.3 Protection For Unix Files and Directories 6 1.10.4…

    • 7689 Words
    • 31 Pages
    Powerful Essays
  • Powerful Essays

    * Process of Recognising, measuring, recording (also known as transactions), disclosing and attesting to information.…

    • 2525 Words
    • 11 Pages
    Powerful Essays