Preview

Unit 3 Discussion 1: Access Control Models

Satisfactory Essays
Open Document
Open Document
286 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 3 Discussion 1: Access Control Models
NT2580
Unit 3 Discussion 1: Access Control Models
10/01/2013

Scenario 1: (DAC) Discretionary Access Control. Being that the business is small and not in need of higher security measures, it would be the easiest to maintain and monitor for a small business.
Scenario 2: (MAC) Mandatory Access Control. The employees primarily communicate using smartphones; which proves as a possible security risk. MAC is stronger than DAC but, still easily monitored for a small business; which makes this the top choice for Top Ads.
Scenario 3: (RBAC) Role Based Access Control. With the company being as large as it is and the employees traveling and/or working from home, the roles set by a Security Administrator would be the most secure and efficient way of providing different levels of clearance to individual users. It would take time to start from nothing but, once the security measures are in place it would be easy to monitor and to manage.
Scenario 4: Content-Dependent Access Control. Since everything that the company does depends on the individual material being manufactured the above Access Control type should be apparent. Giving permissions by what is contained in each individual file is more costly but, a lot more secure. It also allows the company to monitor the data sent less as each document is given its own set of roles.
Scenario 5: (RBAC) Role Based Access Control. With RBAC in place the security measures would be assigned to each user and monitored by the security administrator(s). Using this Access control method would allow for high-grade security with manageability in mind. Allowing each user a set of permissions dependent on their group, or role, allows the system admin to more easily monitor security by group; which is perfect for a military network.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    It240 Week 3

    • 370 Words
    • 2 Pages

    For all three settings given the conditions in which to work with a client server based model is the choice. This choice is made for a few different reasons while considering multiple factors. First off client server includes an option for flexibility. That is growth and, or modification to any existing device, or future additions to the system. The design, implication, material, and budget demands are reasonably accomplishable. A client server offers tighter security through a central database which houses an array of customized permissions which allows an appointed user whatever access is needed. A client server base model is reasonably equipped to accommodate the expanding business to the business with everything…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 1 Study Guide

    • 508 Words
    • 3 Pages

    Role-based access control (RBAC) is an access policy determined by the system, not the owner. RBAC is used in commercial applications and also in military systems, where multi-level security requirements may also exist. RBAC differs from DAC in that DAC allows users to control access to their resources, while in RBAC, access is controlled at the system level, outside of the user's control. Although RBAC is non-discretionary, it can be distinguished from MAC primarily in the way permissions are handled. MAC controls read and write permissions based on a user's clearance level and additional labels. RBAC controls collections of permissions that may include complex operations such as an e-commerce transaction, or may be as simple as read or write. A role in RBAC can be viewed as a set of…

    • 508 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Lab 7 & 8

    • 1094 Words
    • 5 Pages

    4. What is a recommended best practice when implementing a Remote Access Policy server user authentication service?…

    • 1094 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Implementing remote access will allow employees to telecommute which can bring down overhead costs and allow users the flexibility of accessing data outside of the office. In order to protect the data as well as users, audits and access control lists are to be implemented. Access Control allows the identity of the user to determine whether or not they are able to access certain file systems. In order for access control to work properly every user attempting to access the data will need to be entered into the system. Placing passwords on individual files will also provide an added layer of protection.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Most of the salespeople for Old Reliable Life Insurance are visiting customers in their homes or offices. Today, the salespeople carry a laptop computer to show value projections and cash flow summaries for various policies. Many of them also carry a PDA for appointments and a mobile phone. Julie would like to ensure that salespeople have access to the home office server computers while they are making their sales presentations to customers. In order to do this I have prepared three of the best options, to be reviewed, that I believe would benefit the customer as well as the salesperson.…

    • 596 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Use least-privileged accounts, consider the granularity of access, enforcing separation of privileges, secure the system resources against system identities DB system having multiple administrators…

    • 1000 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Once these steps have been completed, we are then ready to add users to the organizational unit. After the users are in the system, we may then create work-groups within the ORGANIZZATIONAL UNIT: “SALES”. We will then set security profiles (aka privileges) for the types within the group. For example; Sales Manager, Sales Staff (sales-persons), finally Sales Admin Asst. The access levels could be described and determined as the “Sales Manager” would have access to all shared and private (Sales-person's private or protected documents on the server). Each individual sales-person would then retain access to all the shared documents as well as their own personal or protected documents. Lastly, the Sales Admin Asst, could have “read-only” access to all shared and protected Sales-persons documents within the work-group for the purpose of performing his/her required duties.…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Access Control is an important part of any business. Anytime a business is under construction it will be more vulnerable to threats and attacks. Construction will need more protection because of the ability to gain easier access to a building because of the open areas within the building. Certain areas in a building are a target for attacks. Some areas are higher risk because of the information or high-value assets within the building. Access Control is the best way to wing out some threats and minimize other threats. Each individual at an access point will have several types of protection such as gates, lighting, cameras, detectors, sensors and other devices that can check individuals thoroughly and make sure each one is authorized to be in the building. Keeping individuals out that have no authorization can lower threats and minimizes chances of damage occurring externally. Access control will work from the outside in to protect a business.…

    • 1456 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    VLAN

    • 493 Words
    • 2 Pages

    By having the network divided into four sections, the network will better secure by making each section compartmentalize. We can achieve this by having each section logically separated from the rest which will restrict the access from segment to segment. If we want to increase security on the network, this is the way to do it. In controlling the access to the individuals segment on the company, we can establish users groups based on their required function; allowing the segment to access the information needed and making sure that only those who need it, access it.…

    • 493 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Vlan Implementation Plan

    • 544 Words
    • 3 Pages

    The plan to improve security is that each segment will be separated from the rest of the network, so access is restricted form the segment to segment. The best way to increase security is by controlling access to the individual segment by user groups based on the segments of networks. This will ensure that the engineering staff will have the access they need but also anyone else that needs it has access too. The same will apply for the other groups, providing security barriers around the data that needs to be protected.…

    • 544 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Week2 lab 1

    • 494 Words
    • 2 Pages

    Given a scenario where there are five (5) database administrators that may periodically need access to a given system. Discuss a concept to better manage these administrators' access permissions.…

    • 494 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Vpn and Radius

    • 470 Words
    • 2 Pages

    Besides the normal tasks of maintaining remote-access server (RAS) equipment, managers often find their time consumed administering access rights and authentication privileges on several, geographically dispersed remote access servers at the same time.…

    • 470 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Cloud computing

    • 1233 Words
    • 5 Pages

    2. I would give my suggestion base on clients’ acceptable level of computing performance, sensitivity of data and IT budget. If customer data need a high level of security, I would suggest it adopting private cloud due to its on-premise storage and high reliability. Company…

    • 1233 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Proposal

    • 739 Words
    • 3 Pages

    Oversee security across the entire network from a single location. Enlist a range of customization and reporting features to tweak the system security as you need.…

    • 739 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Physical access means that only certain employees are able to access the door lock. They are the one who has the priorities to access to the important areas such as server room, administrative offices, filing cabinets and so on (Hotline, 2015). Logical access refers to access to the organization’s information system which means only certain individuals are able to access the system and other employees are restricted to access it (Hotline, 2015). Therefore, only accounting employees have the access to the data of the financial statements of the company and only sales employees have the access to the information of the customers. It is important to have access control to avoid the sensitive data disclosed to the third…

    • 749 Words
    • 3 Pages
    Good Essays

Related Topics