How system interacts or communicates with other resources

Assignment Help Computer Engineering
Reference no: EM132233673

Question: Access Control.

Access control is a procedure that is incorporated into an organization's information technology environment. The system identify and regulate the authorization process to gaining control of software, control policies, auditing and enforcement of a given command. Access control (AC) is the selective constraint of access to a place or other resource in the field of physical security and information security. This controls how the system interacts or communicates with other resources or systems.

There is various type of access control system and they differ based on their purpose and they include mandatory access control which is security model in which access rights are controlled by a central authority based on numerous levels of security (Levergood et al, 1998). Discretionary access control is access control technique in which owners or overseers of the secured system, statistics or resource set the strategies outlining who or what is authorized to access the resource.

Some of the factor that influences the selection of the access control system includes need or purpose of the company. Security or purpose is one of the fundamental aspects that any organization requires in order to remain competitive. Therefore, the given purpose that the access system offer determines the selection for instance for prevention you will select preventive access control (Sandhu et al, 1996). Cost of the access control system is another aspect that can determine the selection process where a less expensive platform can be considered over an expensive one. Flexibility is the other aspect where the access control system needs to be flexible integrating with other systems. The ease of use is another factor that can determine the selection of the access control system in the sense that the owner needs something easy to control and use. The operation of the business or traffic of people using a given system can determine the selection process in the sense that a high traffic or busy system will require more sophisticated access control systems.

Reference no: EM132233673

Questions Cloud

Discuss three challenges that cloud organizations could face : Companies that collect data on citizens in European Union (EU) countries will need to comply with strict new rules around protecting customer data by May 25.
What steps can companies take to protect trade secrets : What steps can companies take to protect trade secrets? With more persons working from home, how does one separate data intended for the employer.
How does the choice of encryption impact vpns : Encryption and a secure VPN are virtually inseparable. A secure VPN exists only because its traffic is encrypted. But some trusted VPNs may or may not use.
Develop a network diagram using microsoft visio : As an IT networking trainee for your organization, your supervisor has given you an assignment to extend the Mayberry Network to an additional space.
How system interacts or communicates with other resources : Access control is a procedure that is incorporated into an organization's information technology environment. The system identify and regulate the authorization
What would you do in the given situation : You are a professionally certified project manager working for a consulting company. Your manager has just let you know that you will be assigned to work.
Identify emerging technology that poses ethical challenges : Conduct research and find one article that identifies one emerging technology that poses ethical challenges. Describe the technology and ethical issues raised.
Write an essay describing that information : There may be personal information that you want considered as part of your admissions application. Write an essay describing that information.
How you would remain anonymous and avoid detection : Imagine for a moment that you are a hacker, an ethical one. You are called upon by law enforcement to hack into a business network known to be engaged.

Reviews

Write a Review

 

Computer Engineering Questions & Answers

  Draw the table to show the result of passing through s-boxes

Draw the table to show the result of passing 111111 through all 8 S-boxes. 13o you see a pattern in the outputs?

  Discuss what are the new innovation today in this area

Virtual Machines: Discuss what are the new innovation today in this area and what effect this area have on the computer field.

  What types of files would be needed

Visit a commercial Web site (e.g., CDnow, Amazon. com). If files were being used to store the data supporting the application, what types of files would be needed? What data would they contain?

  In brief explain the given options for ending a computing

briefly describe the following options for ending a computing session log off option switch user option sleep option

  A robot has a position and a method

A robot has a position and a method void move (Maze m) thatmodifies the position. Provide a common superclass Robot whose move method does nothing

  Discuss the different types of plan testing and training

Discuss the difference between a Continuity of Operations Plan (COOP), a Business Continuity Plan (BCP), and a Disaster Recovery Plan (DRP).

  Find maximum resolution that can be supported by instruction

Suppose a 68000 is to be used to process digital images (e.g., in a laser printer). An image is made up of an array of n-by-tz pixels.

  Create a main driver class

Design and implement a set of classes that keeps track of various sports statistics. Have each low-level class represent a specific sport.

  Write the type definitions necessary

Write the type definitions necessary to contain information in a direct file. How many book records can a computer with 1,440,000 characters of file space hold?

  Exploring web for security education

Explore the Web for security education and the training programs within your area. Keep down a list and examine which of the category has most examples.

  Write c expressions to generate the bit patterns

Write C expressions to generate the bit patterns that follow, where ak represents k repetitions of symbol a. Assume a w-bit data type.

  Show how to premultiply a by a sequence of rotations

Suppose A E Rnxn. Show how to premultiply A by a sequence of rotations so that A is transformed to lower triangular form.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd