How system interacts or communicates with other resources

Assignment Help Computer Engineering
Reference no: EM132233673

Question: Access Control.

Access control is a procedure that is incorporated into an organization's information technology environment. The system identify and regulate the authorization process to gaining control of software, control policies, auditing and enforcement of a given command. Access control (AC) is the selective constraint of access to a place or other resource in the field of physical security and information security. This controls how the system interacts or communicates with other resources or systems.

There is various type of access control system and they differ based on their purpose and they include mandatory access control which is security model in which access rights are controlled by a central authority based on numerous levels of security (Levergood et al, 1998). Discretionary access control is access control technique in which owners or overseers of the secured system, statistics or resource set the strategies outlining who or what is authorized to access the resource.

Some of the factor that influences the selection of the access control system includes need or purpose of the company. Security or purpose is one of the fundamental aspects that any organization requires in order to remain competitive. Therefore, the given purpose that the access system offer determines the selection for instance for prevention you will select preventive access control (Sandhu et al, 1996). Cost of the access control system is another aspect that can determine the selection process where a less expensive platform can be considered over an expensive one. Flexibility is the other aspect where the access control system needs to be flexible integrating with other systems. The ease of use is another factor that can determine the selection of the access control system in the sense that the owner needs something easy to control and use. The operation of the business or traffic of people using a given system can determine the selection process in the sense that a high traffic or busy system will require more sophisticated access control systems.

Reference no: EM132233673

Questions Cloud

Discuss three challenges that cloud organizations could face : Companies that collect data on citizens in European Union (EU) countries will need to comply with strict new rules around protecting customer data by May 25.
What steps can companies take to protect trade secrets : What steps can companies take to protect trade secrets? With more persons working from home, how does one separate data intended for the employer.
How does the choice of encryption impact vpns : Encryption and a secure VPN are virtually inseparable. A secure VPN exists only because its traffic is encrypted. But some trusted VPNs may or may not use.
Develop a network diagram using microsoft visio : As an IT networking trainee for your organization, your supervisor has given you an assignment to extend the Mayberry Network to an additional space.
How system interacts or communicates with other resources : Access control is a procedure that is incorporated into an organization's information technology environment. The system identify and regulate the authorization
What would you do in the given situation : You are a professionally certified project manager working for a consulting company. Your manager has just let you know that you will be assigned to work.
Identify emerging technology that poses ethical challenges : Conduct research and find one article that identifies one emerging technology that poses ethical challenges. Describe the technology and ethical issues raised.
Write an essay describing that information : There may be personal information that you want considered as part of your admissions application. Write an essay describing that information.
How you would remain anonymous and avoid detection : Imagine for a moment that you are a hacker, an ethical one. You are called upon by law enforcement to hack into a business network known to be engaged.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd