More Subjects
Week 5 Questions Essay
Student’s Name
Institution
Date
Q1: Compare the different Access Control Models and give an example of one that you have used in a work situation or if that is not possible, one that you’ve read about in a scholarly article.
Access Control and access models are essential elements in security application of data. The access control gives an individual permission to use or entry into a system by looking at the idenfication and then provide authorization. It allows individuals to access files, folders and other data from a system or computer by looking into their login credential CITATION Dar14 \l 1033 (Gibson, 2014). However, access control models provide role based access conrol, mandotory access control, discretionary access control and rule based access control. It provide access to the system based on the privilage and level of an individual. It means that the level of access is limited to keep confidentiality of the data.
Q2: Describe the three factors that can be used in authentication and give at least two examples for each.
There are severak factors, which are used for authentications to ensure that unauthorized entry into the system is prevented. The users’ Name, Idenfication, passwords, which are regarded as knowledge factors are used for authentication CITATION Rou18 \l 1033 (Rouse & Haughn, 2018). However, other factors are possession and inheritance factors. The possession factors are employee’s ID, Smartphones with OTTP and key fobs. These are things, which a person must carry with at a particular time. The inheritance factors are bilogical traits such as latina, finger print scan and voice recognization.
Q3Describe the RADIUS, TACACS, and DIAMETER forms of centralized access control administration. What are the advantages and disadvantages of decentralized administration.
Diameter centralized access control provide uniform and consistent method of control. Radius is client/server control access. It mostly used remotely to control the entry and access of inroamtion without client knowing. TACACS provide permission to access control from one central location. It is a TCP connection developed to use UDP protocol connectionless. The advantage of centralized access is that it gives control and check the entry or access to the system using protocols.
References
BIBLIOGRAPHY Gibson, D. (2014). Understanding factors in Data Security . Information Management and Data Security , 2-15.
Rouse, M., & Haughn, M. (2018). Three-factor authentication. International Journal of COmputer and Information Security , 2-15.
More Subjects
Join our mailing list
@ All Rights Reserved 2023 info@freeessaywriter.net