It 244 Appendix F

887 words 4 pages
Axia College Material
Appendix F

Access Control Policy

Student Name: Katelyn Sims

Axia College

IT/244 Intro to IT Security

Instructor’s Name: Jennifer McLaughlin

Date: 11/22/2011

Access Control Policy

Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems

1 Authentication

Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.

Authentication of an individual to access and use files, systems, and screens is vital to
…show more content…

Role based access control is when the user is set certain roles that give them access to specific systems and data. They are only granted access to information that is defined in their set role. If their daily job changes, extra roles that define what they need to access will be granted. There are three rules that need to be followed when handling role based access. First is the user can only give permission to others if they have that ability defined in their set role. Second is that users are only allowed to do additional roles in areas that they are authorized. The third rule is that a user can only give permission if it is authorized within their role.

3 Remote access

Describe the policies for remote user access and authentication via dial-in user services and Virtual Private Networks (VPN)

Remote access is a user accessing their work system and data using the company’s network at a remote location that is anywhere besides at work. It is essential to monitor who is given this type of access and what they are allowed to access when they are not using the company’s devices. A VPN (virtual private network) lets the user access these resources to the network through a protected tunnel on a public network, such as the internet, from a remote location. Remote access dial in user service (RADIUS) is used to connect users to the network via a modem. It authenticates the user so their

Related

  • Gaming and Club Management
    3152 words | 13 pages
  • Financial Statistics
    3584 words | 15 pages
  • Evidence Based Practice
    5191 words | 21 pages
  • Feasibility Study on Establishing a Specialty Ice Cream Shop
    9446 words | 38 pages
  • Commercial Liens - a Potent Weapon
    32369 words | 130 pages
  • Vietnam Internet Data Center Report
    9461 words | 38 pages
  • The Analysis of Financial Position of Heineken, Carlsberg and Saigon Beer Company
    15716 words | 63 pages
  • Dubai's Political and Economic Development:
    38747 words | 155 pages
  • Sda Manual
    101202 words | 405 pages