It 244 Appendix F

887 words 4 pages
Axia College Material
Appendix F

Access Control Policy

Student Name: Katelyn Sims

Axia College

IT/244 Intro to IT Security

Instructor’s Name: Jennifer McLaughlin

Date: 11/22/2011

Access Control Policy

Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems

1 Authentication

Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.

Authentication of an individual to access and use files, systems, and screens is vital to
…show more content…
Role based access control is when the user is set certain roles that give them access to specific systems and data. They are only granted access to information that is defined in their set role. If their daily job changes, extra roles that define what they need to access will be granted. There are three rules that need to be followed when handling role based access. First is the user can only give permission to others if they have that ability defined in their set role. Second is that users are only allowed to do additional roles in areas that they are authorized. The third rule is that a user can only give permission if it is authorized within their role.

3 Remote access

Describe the policies for remote user access and authentication via dial-in user services and Virtual Private Networks (VPN)

Remote access is a user accessing their work system and data using the company’s network at a remote location that is anywhere besides at work. It is essential to monitor who is given this type of access and what they are allowed to access when they are not using the company’s devices. A VPN (virtual private network) lets the user access these resources to the network through a protected tunnel on a public network, such as the internet, from a remote location. Remote access dial in user service (RADIUS) is used to connect users to the network via a modem. It authenticates the user so their

Related

  • Appendix a American Imperialism
    1311 words | 6 pages
  • William F. Buckley, Jr.
    1161 words | 5 pages
  • F&N Strategic Management
    2620 words | 11 pages
  • F & C International, Inc. Case 4.2
    1470 words | 6 pages
  • Appendix E Solution
    3544 words | 15 pages
  • APPENDIX CFORMS OF BUSINESS ORGANIZATIONSBelow Are
    4463 words | 18 pages
  • The F Word
    934 words | 4 pages
  • University of Phoenix Material Appendix D
    2872 words | 12 pages
  • Information Technology Project Management Appendix Answers
    19468 words | 78 pages
  • Engm 244 Final Paper
    2870 words | 12 pages