Preview

Unit 3 Discussion 1: Access Control Models

Satisfactory Essays
Open Document
Open Document
286 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 3 Discussion 1: Access Control Models
NT2580
Unit 3 Discussion 1: Access Control Models
10/01/2013

Scenario 1: (DAC) Discretionary Access Control. Being that the business is small and not in need of higher security measures, it would be the easiest to maintain and monitor for a small business.
Scenario 2: (MAC) Mandatory Access Control. The employees primarily communicate using smartphones; which proves as a possible security risk. MAC is stronger than DAC but, still easily monitored for a small business; which makes this the top choice for Top Ads.
Scenario 3: (RBAC) Role Based Access Control. With the company being as large as it is and the employees traveling and/or working from home, the roles set by a Security Administrator would be the most secure and efficient way of providing different levels of clearance to individual users. It would take time to start from nothing but, once the security measures are in place it would be easy to monitor and to manage.
Scenario 4: Content-Dependent Access Control. Since everything that the company does depends on the individual material being manufactured the above Access Control type should be apparent. Giving permissions by what is contained in each individual file is more costly but, a lot more secure. It also allows the company to monitor the data sent less as each document is given its own set of roles.
Scenario 5: (RBAC) Role Based Access Control. With RBAC in place the security measures would be assigned to each user and monitored by the security administrator(s). Using this Access control method would allow for high-grade security with manageability in mind. Allowing each user a set of permissions dependent on their group, or role, allows the system admin to more easily monitor security by group; which is perfect for a military network.

You May Also Find These Documents Helpful

  • Good Essays

    Most of the salespeople for Old Reliable Life Insurance are visiting customers in their homes or offices. Today, the salespeople carry a laptop computer to show value projections and cash flow summaries for various policies. Many of them also carry a PDA for appointments and a mobile phone. Julie would like to ensure that salespeople have access to the home office server computers while they are making their sales presentations to customers. In order to do this I have prepared three of the best options, to be reviewed, that I believe would benefit the customer as well as the salesperson.…

    • 596 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Once these steps have been completed, we are then ready to add users to the organizational unit. After the users are in the system, we may then create work-groups within the ORGANIZZATIONAL UNIT: “SALES”. We will then set security profiles (aka privileges) for the types within the group. For example; Sales Manager, Sales Staff (sales-persons), finally Sales Admin Asst. The access levels could be described and determined as the “Sales Manager” would have access to all shared and private (Sales-person's private or protected documents on the server). Each individual sales-person would then retain access to all the shared documents as well as their own personal or protected documents. Lastly, the Sales Admin Asst, could have “read-only” access to all shared and protected Sales-persons documents within the work-group for the purpose of performing his/her required duties.…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Week2 lab 1

    • 494 Words
    • 2 Pages

    Given a scenario where there are five (5) database administrators that may periodically need access to a given system. Discuss a concept to better manage these administrators' access permissions.…

    • 494 Words
    • 2 Pages
    Good Essays
  • Better Essays

    This will allow access only to those doing the accounting for the company. The company also needs to have written policies. Written policies will outline rules and regulations regarding the security of information. Written policies will also explain how to keep information secure and what to do if there is a security breach. Included in the policies should be consequences of not following the rules and regulations. The company needs to have backup procedures in case the system crashes. The system should be set to back up every other day or everyday to ensure not to lose too much information. To better protect confidential information from intrusion, the company should have some firewall protection. A firewall “guards against unauthorized access to sensitive file information from external internet users. On networked systems, firewalls are often standalone devices with built-in, protective software” (Bagranoff, Simkin & Strand, 2008, pg. 39). The company should also invest in anti-spyware and anti-virus protection to protect the system from any viruses. Following the above suggestions will help minimize any threats to the company’s current system.…

    • 1170 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Access Control is an important part of any business. Anytime a business is under construction it will be more vulnerable to threats and attacks. Construction will need more protection because of the ability to gain easier access to a building because of the open areas within the building. Certain areas in a building are a target for attacks. Some areas are higher risk because of the information or high-value assets within the building. Access Control is the best way to wing out some threats and minimize other threats. Each individual at an access point will have several types of protection such as gates, lighting, cameras, detectors, sensors and other devices that can check individuals thoroughly and make sure each one is authorized to be in the building. Keeping individuals out that have no authorization can lower threats and minimizes chances of damage occurring externally. Access control will work from the outside in to protect a business.…

    • 1456 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Vlan Implementation Plan

    • 544 Words
    • 3 Pages

    The plan to improve security is that each segment will be separated from the rest of the network, so access is restricted form the segment to segment. The best way to increase security is by controlling access to the individual segment by user groups based on the segments of networks. This will ensure that the engineering staff will have the access they need but also anyone else that needs it has access too. The same will apply for the other groups, providing security barriers around the data that needs to be protected.…

    • 544 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Proposal

    • 739 Words
    • 3 Pages

    Oversee security across the entire network from a single location. Enlist a range of customization and reporting features to tweak the system security as you need.…

    • 739 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Cloud computing

    • 1233 Words
    • 5 Pages

    2. I would give my suggestion base on clients’ acceptable level of computing performance, sensitivity of data and IT budget. If customer data need a high level of security, I would suggest it adopting private cloud due to its on-premise storage and high reliability. Company…

    • 1233 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    CMS system

    • 3636 Words
    • 15 Pages

    Control access to data, based on user roles (defining which information users or user groups can view, edit, publish, etc.)…

    • 3636 Words
    • 15 Pages
    Powerful Essays
  • Satisfactory Essays

    VLAN

    • 493 Words
    • 2 Pages

    By having the network divided into four sections, the network will better secure by making each section compartmentalize. We can achieve this by having each section logically separated from the rest which will restrict the access from segment to segment. If we want to increase security on the network, this is the way to do it. In controlling the access to the individuals segment on the company, we can establish users groups based on their required function; allowing the segment to access the information needed and making sure that only those who need it, access it.…

    • 493 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Question #01: Compare access control techniques between Linux and Windows. Which one provides better control and in which conditions?…

    • 1163 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Physical access means that only certain employees are able to access the door lock. They are the one who has the priorities to access to the important areas such as server room, administrative offices, filing cabinets and so on (Hotline, 2015). Logical access refers to access to the organization’s information system which means only certain individuals are able to access the system and other employees are restricted to access it (Hotline, 2015). Therefore, only accounting employees have the access to the data of the financial statements of the company and only sales employees have the access to the information of the customers. It is important to have access control to avoid the sensitive data disclosed to the third…

    • 749 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The company can easily give access to certain parts of the computerized system to one group in the company and not the other. This way, information is kept private or public, depending of the company needs.…

    • 349 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Vpn and Radius

    • 470 Words
    • 2 Pages

    Besides the normal tasks of maintaining remote-access server (RAS) equipment, managers often find their time consumed administering access rights and authentication privileges on several, geographically dispersed remote access servers at the same time.…

    • 470 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Currently, security operations involve the guarding of buildings and equipment in addition to protection of networks, taking care of issues of privacy, and risk management. The interrelation between the aspects of the security initiatives necessitates consolidation of the two security systems. Such a convergence of the IT and physical security functions is important in achieving an efficient security system (Mehdizadeh, Y, 2003). However, such an operation is also lined up with disadvantages.…

    • 4782 Words
    • 16 Pages
    Good Essays