Discussion-11
Discussion: Multilayer User Access Control
Learning Objectives and Outcomes
- Identify what implementation method(s) can be used to incorporate multilayer access control
- Describe and how each method benefits multilayered access control.
Assignment Requirements
Read the worksheet named “Multilayer User Access Control” and address the following:
Using what you have learned about building a multilayer access control system, identify what implementation method(s) can be used and how each method benefits multilayered access control.
Respond to your peers with your point of view on their answers. Respond to at least two of your classmates’ original thread posts with between 100 – 150 words for each reply. Make sure your opinion is substantiated with valid reasons and references to the concepts covered in the course. In addition, initiate a discussion with the students who comment on your answer.
Required Resources
- Worksheet: Multilayer User Access Control (ws_multilayeraccesscontrol)
Self-Assessment Checklist
Use the following checklist to support your work on the assignment:
- I have engaged in discussion of the assigned topics with at least two of my peers.
- I have raised questions and solicited peer and instructor input on the topics discussed.
- I have articulated my position clearly and logically.
- I have supported my argument with data and factual information.
- I have provided relevant citations and references to support my position on the issue discussed.
- I have compared and contrasted my position with the perspectives offered by my peers and highlighted critical similarities and differences.
- I have solicited peer and instructor feedback on my arguments and propositions.
- I have offered a substantive, critical evaluation of my peer’s perspective on the issues that is opposite of mine and supported my critical review with data and information.
- I have followed the submission requirements.
350 words
Multilayer User Access Control
© 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.
www.jblearning.com Page 1
Implementing multiple layers in security is providing a defense-in-depth mechanism and therefore
stronger protection for the network and users. Multiple layers provide multiple road blocks for a user and
attacker. Having multiple controls in place before something can be accessed may be tiresome for a user;
however, the goal is to have the same effect on an attacker. If an attacker is able to find a hole and
access a company’s network, additional layers of security might stop the attacker from reaching other
systems, applications, or sensitive data.
In this exercise, you will learn about creating layers within the network.
Complete the table:
Access Control
Method Implementation Method(s)
How It Benefits Multilayered
Access Control
User Access Control
Profiles
Systems Access
Applications Access
File and Folder Access
Data Access