Preview

Accounting Information System

Powerful Essays
Open Document
Open Document
2510 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Accounting Information System
|CH 8: Authentication: Process of verifying the identity of the person or device attempting to access the |
|system. The objective is to ensure that only legitimate users can access the system. Three different |
|credentials are PINs(password), ID badge, or biometrics. Authorization: Process of restricting access of |
|authenticated users to specific portions of the system and limiting what actions they are permitted to |
|perform. Access control matrix: shows that access controls of each user or device in your company to see |
|who have what privileges. Best Practice of Passwords: Must have at least 8 characters in length, must have|
|multiple character types (upper-lower case, numbers, and special characters), Randomness (not be words |
|found in dictionary), and changed frequently (every 30 for sensitive of 90 for most users). Physical |
|Access Controls: Only have one unlocked door during business hours (none after hours), safe lock all |
|devices (computers, phones, and PDA devices), and physical access controls must be cost-effective. Access |
|to the wiring used in the org’s LANs needs to be restricted in order to prevent wiretapping. Firewall: |
|behind the border router (connects an orgs information system to the internet), and is either a |
|special-purpose hardware device or software running on a general-purpose computer. The demiliarized is a |
|seperate network that permits controlled access from the internet to selected resources, such as the |
|organizarion’s e-commerce Web server. Intrusion Prevention System: Monitors patterns in the traffic flow, |
|rather than only inspecting individual packets, to identify and automatically block attacks. Examining |
|pattern traffic is often the only way to identify undesirable activity. Intrusion Detection System |
|consists of a set of sensors and a central monitoring unit that create logs of network traffic that was |
|permitted to pass

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Router Management Out-of-Band Management Username and Password Authentication. Traffic VPN and Tunnel Based Traffic ACL and Tunnel Traffic Established Between Trusted End Points. UDP and TCP Protocol Enforcement with Stateful Firewall Access list Source and Destination, Address and Session established with Layer 7 Firewall Protection.…

    • 155 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    A hardware firewall is configured with two or more network interfaces typically placed between a corporate LAN and the WAN connection.…

    • 817 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Netw420 Week 4 lab report

    • 726 Words
    • 3 Pages

    This week’s assignment is to describe various event categories and event based transactions that are used by the Network Management System. It would be impossible to categorize all potential causes for alarms in all existing network systems however, understanding some common alerts and categories is essential for any network manager.…

    • 726 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    NT1330 Unit 3 Assignment 3

    • 1030 Words
    • 5 Pages

    Routers these are the same setup as the firewall, by users to config the setting the one thing the company does not want to do is use the default setting for any router. Routers are the essential, but workhorses of modern computer networking yet few users realize they are computers, with their operating systems, software, and vulnerabilities.…

    • 1030 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    During operation, the system uses the access control rules to decide whether access requests consumers shall be approved or disapproved. Resources include individual files or items data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer programs and other devices on the…

    • 711 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Limit unauthorized use of network resources by allowing access during businiess hours only. Do not allow remote access permitions to anyone, except those that…

    • 563 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Lab2 Snort

    • 1322 Words
    • 4 Pages

    References: CSEC 630 Lab2 -Intrusion Detection System and Protocol Analysis Lab (n.d.). University of Maryland University College. Retrieved from: https://learn.umuc.edu/d2l/common/viewFile.d2lfile/Database/NzkyMzkw/CSEC630_lab2_LEO.pdf?ou=33745…

    • 1322 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    -Subpart B. Unauthorized use. Users must abide by the security restrictions on all systems and information to which access is authorized.…

    • 477 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab 3 nt2580

    • 321 Words
    • 2 Pages

    type of access controls and permissions are probably configured? What type of Access Control would…

    • 321 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    NetWitness Investigator, a free tool that provides security practitioners with a means of analyzing packets to…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    LAB 3

    • 368 Words
    • 2 Pages

    6. Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls achieve CIA for departmental LANs departmental folders, and data.…

    • 368 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Access control methods are a process that determines what services or company resources an employee has access to. These methods will be used to determine what an employee can and cannot access, as well as ways to make sure that all employees are being granted the correct access levels. Authentication is a process of determining whether someone or something is who or what they say they are. Authentication can be a form of determining whether an employee is actually the person that they say they are. Employees can be authenticated by being able to answer personal questions that only they would know or by providing a username and password that only the employee knows.…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Good Essays

    Consistent standards for network access and authentication are critical to the company’s information security and are often required by regulations or third-party agreements. Any user accessing the company’s computer systems has the ability to affect the security of all users of the network. An appropriate Network Access and Authentication Policy reduces the risk of a security incident by requiring consistent application of authentication and access standards across the network.…

    • 1461 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    | connects multiple computers or other routers together and transmits data to its correct destination on a network…

    • 2911 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    |Authentication is a process in which the user’s credentials are used to verify|Authorization is a process in which the |…

    • 1819 Words
    • 8 Pages
    Good Essays