Accesscontrol-W6

 Assignment Requirements

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Read the worksheet named “Multilayer User Access Control” and address the following:

Using what you have learned about building a multilayer access control system, identify what implementation method(s) can be used and how each method benefits multilayered access control.

Please complete the table attached in the document

Requirements:

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

1. Two peer replies (100-150 words each)

2. No plagarism

3. Apa FORMAT and add the references

4. Cite the reference properly

Multilayer User Access Control

Implementing multiple layers in security is providing a defense-in-depth mechanism and therefore stronger protection for the network and users. Multiple layers provide multiple road blocks for a user and attacker. Having multiple controls in place before something can be accessed may be tiresome for a user; however, the goal is to have the same effect on an attacker. If an attacker is able to find a hole and access a company’s network, additional layers of security might stop the attacker from reaching other systems, applications, or sensitive data.

In this exercise, you will learn about creating layers within the network.

Complete the table:

Access Control Method

Implementation Method(s)

How It Benefits Multilayered
Access Control

User Access Control Profiles

Systems Access

Applications Access

File and Folder Access

Data Access

© 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.

www.jblearning.com Page 1

1 day ago

Naga Venkata Durga Dilip Teja Atmuri

 

Week – 6 Discussion

COLLAPSE

Top of Form

            Multilayer User

Access

Control

There are various implementation methods that work best in incorporating the multilayer access control in an organization. The implementation of different access control methods is as follows:

User Access Control

Profiles

The role based access control is an implementation method that would work for user access control profiles where it determines what accesses that are allowed and those denied. Role based method is significant in a manner that it offers more control of infrastructure and it targets a large group of people that handle similar tasks and it helps in preventing single user within a role from having more rights and privileges (Chapple et al., 2014)  than others. The approach saves time by making all controls are attached to a given role. It is a benefit to multilayered access control implementation because it allows addition or removal access control in a role based on users’ job risk. 

System Access

There is the need to design a system that meets the needs of the users but does not offer more access rights to systems that what is needed. The system access is implemented by installation of software that makes the system secure from unauthorized access by limiting chances of Trojan horses and malware that is installed (Chapple et al., 2014). The policies that are implemented for the software that is installed includes enforcement of additional policies automatically and the use of trusted publishers as a reference point on their codes whether to allow or deny access. The benefit of the method in multilayered access control system is the limit to access to the greater system. 

Application Access

In an organization employee can have a limited or full access to applications that access data. The application is placed with direct controls that include limiting execution where once launched only specific users are allowed to access. There is the aspect of read-only for some of the users where the changes may be limited to the administrator alone (Chapple et al., 2014). The access security provides an additional security to multilayered access control system. 

File and Folder Access

The implementation of this method is achieved by assigning controls to files and folders which is ranked as another layer of multilayered access control system. The limit on the read and write makes sure that information in files are not altered by unauthorized individuals. The privileges of access should be limited where the administrators should play the role of assigning privileges (Chapple et al., 2014). It plays an important role in protecting files in case other controls are penetrated.

Data Access

The Microsoft SQL Server is an example of implementation method that makes sure that data access is limited to a given person because alteration makes data unreliable and integrity is affected. 

References

Chapple, M., Ballad, B., Ballad, T., & Banks, E. (2014). Access control, authentication, and public key infrastructure. Jones & Bartlett Learning.

3 days ago

Anvesh Sree Perumbuduri 

week 6 Discussion

COLLAPSE

Top of Form

Stable, customizable resource control is available using a computer-based framework. The policy jargon can be understood by humans as well as computers. When laws are written in this language, they are translated into filters inside the different subsystems and components. To enter a network, a person must have a username and password to be approved by an access management scheme that gathers specific details about him. We use the user ID to retrieve a series of abstract policies. The policies that and found and restored are aligned with the user, and the classes to which the consumer belongs. From the obtained network rules, a series of rules are created and extended to multiple layers of the device (Rezakhani, Shirazi & Modiri, 2018).

Access control

Method

Implementation method(s)

How it benefits multilayered

Access control

User access control

Profiles

Regulation of access based on laws

By default, the administrator can specify a set of access rules for the device, but these may be overridden if a task is desired.

 

Systems access

Validation

 
 

The purpose of authentication is to recognize what features the consumer has installed and what certain features are being used to maintain safe access (Voitovych, Kupershtein, Lukichov & Mikityuk, 2018).

 

Applications access

 

Access management dependent on permissions

To verify that a user is authenticated, the access control device will perform the following operations: determine the username and password they have used, look up their credentials in a database, and check if they are valid or not, and log them in if they are, in.

File and folder

Access
 

Developing a plan for access management

The major duty of management is ensuring the structure and availability of consumer documents and information, while at the same time minimizing intrusion into personal privacy.

Data access

Regulation of electronic access

The use of servers and data rooms with expanded electronic controls if you are required to get an authentication credential to access to log into networks and workstations, it’s much more necessary to keep secure data secure.

 
 

References

Rezakhani, A., Shirazi, H., & Modiri, N. (2018). A novel multilayer AAA model for integrated applications. Neural Computing and Applications, 29(10), 887-901.

Voitovych, O., Kupershtein, L., Lukichov, V., & Mikityuk, I. (2018, October). Multilayer Access for Database Protection. In 2018 International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T) (pp. 474-478). IEEE.

Bottom of Form

Bottom of Form

Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
4.9
Sitejabber
4.6
Trustpilot
4.8
Our Guarantees
100% Confidentiality
Information about customers is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.

Order your essay today and save 30% with the discount code ESSAYHELP