Preview

Unit 3 - Access Control Models

Satisfactory Essays
Open Document
Open Document
457 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 3 - Access Control Models
Instructions:
Compare and contrast access control models. Select an access control model that best prevents unauthorized access for each of the five scenarios given below. Which types of logical access controls should be used in each scenario? Justify your recommendations.

Access control models:
Mandatory access controls
Discretionary access controls
Role-based access controls
Rule-based access controls
Content-dependent access controls
Nondiscretionary access controls

Scenarios:
1. Shovels and Shingles is a small construction company consisting of 12 computers that have Internet access.
a. (DAC) Discretionary Access Control. Being that the business is small and not in need of higher security measures, it would be the easiest to maintain and monitor for a small business.
2. Top Ads is a small advertising company consisting of 12 computers that have Internet access. All employees communicate using smartphones.
a. (MAC) Mandatory Access Control. The employees primarily communicate using smartphones; which proves as a possible security risk. MAC is stronger than DAC but, still easily monitored for a small business; which makes this the top choice for Top Ads.
3. NetSecIT is a multinational IT services company consisting of 120,000 computers that have Internet access and 45,000 servers. All employees communicate using smartphones and e-mail. Many employees work from home and travel extensively.
a. (RBAC) Role Based Access Control. With the company being as large as it is and the employees traveling and/or working from home, the roles set by a Security Administrator would be the most secure and efficient way of providing different levels of clearance to individual users. It would take time to start from nothing but, once the security measures are in place it would be easy to monitor and to manage.

4. Backordered Parts is a defense contractor that builds communications parts for the military. All employees communicate using smartphones and e-mail.
a.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    This model would support Role based access controls and allow mandatory access control to be governed by remote access. The IS Dept. is responsible for maintaining the access and access rights and prividgles and restricted as needed by user roles in the organization. All data is encrypted and transmitted via remote and encrypted and used by the vpn tunnel. VPN access will be terminated on a 3 month basis and must be renewed by revisiting based on your access role and…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Lab 7 & 8

    • 1094 Words
    • 5 Pages

    4. What is a recommended best practice when implementing a Remote Access Policy server user authentication service?…

    • 1094 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    During operation, the system uses the access control rules to decide whether access requests consumers shall be approved or disapproved. Resources include individual files or items data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer programs and other devices on the…

    • 711 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Procedures/ The SA or other personnel to be the responsible authority in informing all local authorities about patches that are related to software packages included on the entire inventory of the organizations software.…

    • 668 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Fast Streaming A collection of techniques that enables Windows Media Player to begin displaying streamed multimedia content more quickly.…

    • 4603 Words
    • 19 Pages
    Good Essays
  • Good Essays

    2. Top Ads is a small advertising company consisting of 12 computers that have Internet access. All employees communicate using smartphones. Top Ads' primary concern is protecting the data on the smartphones. Select an encryption solution that best protects the smartphones and justify the recommendation.…

    • 406 Words
    • 2 Pages
    Good Essays
  • Good Essays

    8. Which of the following is the preferred method to reduce risks while managing access security controls within the system/application domain?…

    • 939 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Lab 3 nt2580

    • 321 Words
    • 2 Pages

    6. Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls…

    • 321 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    2. What is an Access Control List (ACL) and how is it useful in a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    • Define strict access control policies, standards, procedures, and guidelines. Implement a second-level test to verify a user’s right to gain access.…

    • 447 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Be sure to include an explanation of the advantages and disadvantages of applying each model to your case study.…

    • 831 Words
    • 4 Pages
    Good Essays
  • Good Essays

    IAM Basics

    • 582 Words
    • 3 Pages

    is a method of restricting access to system/ application based on the role. There are 3 approaches…

    • 582 Words
    • 3 Pages
    Good Essays
  • Good Essays

    As you may know, there are many different types of advertisings. Let’s classify them by media. There are television commercials, radio commercials, Press Advertising, Outdoor Advertising, Online Advertising, Domain name advertising, Mobile Marketing. Different medias show different features, so advertisers choose different ways to market their products. Most influential mass media is television, however more and more advertising budget flow to Online Advertisings recent years.…

    • 575 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    * Create User types in the system and define user rights to them, to allow employees to access the system at any time, while preserving the confidentiality of other employee information.…

    • 970 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    4. Advertisements through Internet – Advertisements done via internet are an increasingly famous method to promote any business. Internet advertisements are of many types. The ads which are displayed on the web-pages are called as banner-ads. A person can even search for a product on Google search. Online advertising's fastest growing type is social-network-marketing. Social networking sites include sites such as Facebook, LinkedIn and Twiter for promoting a service or product.…

    • 483 Words
    • 2 Pages
    Satisfactory Essays

Related Topics