Unit 3 Discussion 1: Access Control Models

Satisfactory Essays
Topics: Access control
NT2580
Unit 3 Discussion 1: Access Control Models
10/01/2013

Scenario 1: (DAC) Discretionary Access Control. Being that the business is small and not in need of higher security measures, it would be the easiest to maintain and monitor for a small business.
Scenario 2: (MAC) Mandatory Access Control. The employees primarily communicate using smartphones; which proves as a possible security risk. MAC is stronger than DAC but, still easily monitored for a small business; which makes this the top choice for Top Ads.
Scenario 3: (RBAC) Role Based Access Control. With the company being as large as it is and the employees traveling and/or working from home, the roles set by a Security Administrator would be the most secure and efficient way of providing different levels of clearance to individual users. It would take time to start from nothing but, once the security measures are in place it would be easy to monitor and to manage.
Scenario 4: Content-Dependent Access Control. Since everything that the company does depends on the individual material being manufactured the above Access Control type should be apparent. Giving permissions by what is contained in each individual file is more costly but, a lot more secure. It also allows the company to monitor the data sent less as each document is given its own set of roles.
Scenario 5: (RBAC) Role Based Access Control. With RBAC in place the security measures would be assigned to each user and monitored by the security administrator(s). Using this Access control method would allow for high-grade security with manageability in mind. Allowing each user a set of permissions dependent on their group, or role, allows the system admin to more easily monitor security by group; which is perfect for a military network.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Instructions: Compare and contrast access control models. Select an access control model that best prevents unauthorized access for each of the five scenarios given below. Which types of logical access controls should be used in each scenario? Justify your recommendations. Access control models: Mandatory access controls Discretionary access controls Role-based access controls Rule-based access controls Content-dependent access controls Nondiscretionary access controls Scenarios: 1. Shovels and Shingles is…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Access Control Models

    • 2490 Words
    • 10 Pages

    Network Hardening Network Hardening Unit 8 Assignment 1 It is very important to go through the process of hardening. Hardening is where you change the hardware and software configurations to make computers and devices as secure as possible. I picked the network layout 1-the workgroup . First with the worksta Premium287 Words2 Pages NT2580: Unit 1 Match Risks/Threats to Solutions NT2580: Unit 1 Match Risks/Threats to Solutions Data Classifications Standards Richman Investments Data Classification…

    • 2490 Words
    • 10 Pages
    Satisfactory Essays
  • Good Essays

    70-643 A access control entry (ACE)/ An entry in an object’s access control list (ACL) that grants permissions to a user or group. Each ACE consists of a security principal (the name of the user, group or computer being granted the permissions) and the specific permissions assigned to that security principal. When you manage permissions in any of the Windows Server 2008 permission systems, you are creating and modifying the ACEs in an ACL. access control list (ACL) A collection of access control entries…

    • 4603 Words
    • 19 Pages
    Good Essays
  • Satisfactory Essays

    Access Control - 1

    • 450 Words
    • 2 Pages

    system. However, some may cause damage or effect program or system performance. When this happens, it is referred to as your computer being infected. In today’s world of communication, with the internet, computers, cell phones, and having such easy access, viruses are a real threat to your computer system. Mark Ciampa, author of Security +, Guide to Network Security Fundamentals, wrote, “A biological virus is an agent hat reproduces itself”. (Page 43) He goes on to write, “A computer virus is a malicious…

    • 450 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    design a remote access control policy for all systems, applications and data access within Richman Investments. With so many different modes of Access Control to choose from it is my assessment that by choosing only one model would not be appropriate for Richman Investments. My recommendation would be a combination of multiple Access Control Models that overlap to provide maximum coverage and overall security. Here are my suggestions for access controls. Role Based Access Control or RBAC, this…

    • 651 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    UNIT 3 Access Controll

    • 280 Words
    • 2 Pages

    UNIT 3 Administrative Controls Logical and technical control Hardware Control Software control Physical Controls 1. Shovels and shingles is a small construction company consisting of 12 computers that have internet access Physical Controls 2. Top ads is a small advertising company consisting of 12 computers that have internet access . All employees communicate using smartphones Physical Controls 3. NetSecit is a multinational IT service company consisting of 120,000 computers that have…

    • 280 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Access Control: Policies, Models, and Mechanisms Pierangela Samarati1 and Sabrina de Capitani di Vimercati2 1 Dipartimento di Tecnologie dell’Informazione, Universit` a di Milano Via Bramante 65, 26013 Crema (CR), Italy samarati@dsi.unimi.it http://homes.dsi.unimi.it/~samarati 2 Dip. di Elettronica per l’Automazione, Universit` a di Brescia Via Branze 38, 25123 Brescia, Italy decapita@ing.unibs.it http://www.ing.unibs.it/~decapita Abstract. Access control is the process of mediating…

    • 27400 Words
    • 141 Pages
    Powerful Essays
  • Satisfactory Essays

    VPN access control model for a large scale company. * This policy will support remote access control for systems, applications, and data access. Remote access Defined Remote access for employees is deployed by using remote access VPN connections across the Internet based on the settings configured for the VPN Server, and the following additional settings. The following diagram shows the VPN server that provides remote access VPN connections. Domain/Network Config: For each employee…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Discussion

    • 337 Words
    • 2 Pages

    Unit 1 Discussion Board Art Appreciation: HUMA205-1304B-07 November 11, 2013 Part 1 How do you gain an awareness and understanding of art and art forms? Understanding art forms affects individuals in different ways. Such as, informing individual’s art is in the eye of the beholder. It also depends on the art piece—how the viewer interprets the piece. Art comes in all shapes, sizes, and forms, and no art form should be held above another Do you have self-awareness as experienced by the quote…

    • 337 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Access Control

    • 661 Words
    • 3 Pages

    Simply defined, the term "access control" describes any technique used to control passage into or out of any area. The standard lock that uses a brass key may be thought of as a simple form of an "access control system". Over the years, access control systems have become more and more sophisticated. Today, the term "access control system" most often refers to a computer-based, electronic card access control system. The electronic card access control system uses a special "access card", rather than a…

    • 661 Words
    • 3 Pages
    Good Essays