Access Control Policy

Powerful Essays
Associate Level Material
Appendix F

Access Control Policy
Student Name: Casey DeCesare
University of Phoenix
IT/244 Intro to IT Security
Instructor’s Name: Scott Sabo
Date: 5/27/2014
1. Access Control Policy
Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems
1.1. Authentication
Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on. Authentication credentials permit the system to verify one’s identification credential. Authenticating yourself to a system tells it the information you have established to prove that you are who you say you are. Most often, this is a simple password that you set up when you receive the privilege to access a system. You may receive an assigned password initially with the requirement that you must reset it to something more personal—something that only you can remember. However, passwords are the easiest type of authentication to beat. Free and widely available programs are available on the Internet to break the security afforded by passwords on most of the commonly used systems. With two or three factors to authenticate, an information owner can gain confidence that users who access their systems are indeed authorized to access their systems. This is accomplished by adding more controls and/or devices to the password authentication process. Biometric scanning uses unique human characteristics to identify whether the person trying to gain access is authorized to enter or not. One common approach to managing IDs and passwords is to create a password or PIN vault. These programs use secure methods to locally store IDs and passwords that are protected by a master password that unlocks the vault when it’s needed.

1.2.



References: Cite all your references by adding the pertinent information to this section by following this example. Information Security: Principles and Practices, by Mark S. Merkow, CISSP, CISM and Jim Breithaupt.

You May Also Find These Documents Helpful

  • Good Essays

    Access Control Policy

    • 703 Words
    • 3 Pages

    Material Appendix F Access Control Policy Student Name: University of Phoenix IT/244 Intro to IT Security Instructor’s Name: Date: December 9, 2012 Access Control Policy Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems 1 Authentication Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include…

    • 703 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Chris Stewart 4/6/2014 NT2580 Mon AM Policy General 1. It is the responsibility of Richman Investments employees, third party contractors, vendors and agents with remote access privileges to Richman Investments' networks to ensure that their remote access connection is given the same consideration as the user's on-site connection to the company. 2. General access to the Internet for recreational use by employees is discouraged through the Richman Investments Network. Employees of Richman…

    • 254 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    needs and circumstances and have designed a remote access control policy that will work for you and your company. This is a multi-layered security system that consists of the user’s domain. The user is the first and the weakest link in any system. The security is only as strong as the user’s ability to understand what can go wrong. We can implement a training program session for security awareness. Another security measure is to implement a policy to stop employees from bringing in CD’S, DVD’S, and…

    • 775 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Access Control: Policies, Models, and Mechanisms Pierangela Samarati1 and Sabrina de Capitani di Vimercati2 1 Dipartimento di Tecnologie dell’Informazione, Universit` a di Milano Via Bramante 65, 26013 Crema (CR), Italy samarati@dsi.unimi.it http://homes.dsi.unimi.it/~samarati 2 Dip. di Elettronica per l’Automazione, Universit` a di Brescia Via Branze 38, 25123 Brescia, Italy decapita@ing.unibs.it http://www.ing.unibs.it/~decapita Abstract. Access control is the process of mediating…

    • 27400 Words
    • 141 Pages
    Powerful Essays
  • Powerful Essays

    Access Control

    • 2183 Words
    • 9 Pages

    | Access Control | Course Project – SEC330 | | Kristen E. Mosuch | 2/10/2013 | Table of Contents: Introduction………………………………………………………………………………………………………………………………Page 2 Risks and Threats Overview………………………………………………………………………………………………………Page 2 Risks Associated with Access Control………………………………………………………………………………………..Page 3 Methods of Access Control……………………………………………………………………………………………………….Page 4 Government Regulations…………………………………………………………………………………………………………..Page 7 Conclusion…………………………………………………………………………………………………………………………………Page…

    • 2183 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Access Control

    • 661 Words
    • 3 Pages

    Simply defined, the term "access control" describes any technique used to control passage into or out of any area. The standard lock that uses a brass key may be thought of as a simple form of an "access control system". Over the years, access control systems have become more and more sophisticated. Today, the term "access control system" most often refers to a computer-based, electronic card access control system. The electronic card access control system uses a special "access card", rather than a…

    • 661 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Access Control

    • 648 Words
    • 3 Pages

    OATH (Open Authentication) Alvin Claxton Grantham University Abstract The need for stronger authentication methods on line has never been in more demand than at present. There are many services that provide security and authentication while on line or to verify who is the end user. With the rise of identity theft among other cyber crimes, the need for stronger authentication is greatly needed. This written assignment will define, describe and explain OATH (Open Authorization) as a preferred…

    • 648 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Remote Access Control Policy for Richman Investments Authorization- Richman Investments must define rules as to who has access to which computer and network resources. My suggestion is that RI implements either a group membership policy or an authority-level policy to achieve this. Group policy would allow the administrator to assign different privileges to different groups. The admin would then assign different individual users to those different groups. So the users permissions would depend…

    • 302 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Appendix F Access Control Policy Student Name: Patricia Manter University of Phoenix IT/244 Intro to IT Security Instructor’s Name: Kevin Swinson Date: June 24, 2012 Access Control Policy Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems 1 Authentication Describe how and why authentication credentials are used to identify and control access to files, screens, and systems…

    • 838 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Access Control Models

    • 2490 Words
    • 10 Pages

    1Assign 1 Crystal Johnson 1. Violation of a security policy by a user… (C) Place an employee on a probation, review acceptable use policy (AUP) and the employee manual, and discuss status during performance reviews. 2. Disgruntled employee sabotage…(I) Track and monitor a Premium372 Words2 Pages Unit 3 Discussion 1: Access Control Models NT2580 Unit 3 Discussion 1: Access Control Models 10/01/2013 Scenario 1: (DAC) Discretionary Access Control. Being that the business is small and…

    • 2490 Words
    • 10 Pages
    Satisfactory Essays