How system interacts or communicates with other resources

Assignment Help Computer Engineering
Reference no: EM132233673

Question: Access Control.

Access control is a procedure that is incorporated into an organization's information technology environment. The system identify and regulate the authorization process to gaining control of software, control policies, auditing and enforcement of a given command. Access control (AC) is the selective constraint of access to a place or other resource in the field of physical security and information security. This controls how the system interacts or communicates with other resources or systems.

There is various type of access control system and they differ based on their purpose and they include mandatory access control which is security model in which access rights are controlled by a central authority based on numerous levels of security (Levergood et al, 1998). Discretionary access control is access control technique in which owners or overseers of the secured system, statistics or resource set the strategies outlining who or what is authorized to access the resource.

Some of the factor that influences the selection of the access control system includes need or purpose of the company. Security or purpose is one of the fundamental aspects that any organization requires in order to remain competitive. Therefore, the given purpose that the access system offer determines the selection for instance for prevention you will select preventive access control (Sandhu et al, 1996). Cost of the access control system is another aspect that can determine the selection process where a less expensive platform can be considered over an expensive one. Flexibility is the other aspect where the access control system needs to be flexible integrating with other systems. The ease of use is another factor that can determine the selection of the access control system in the sense that the owner needs something easy to control and use. The operation of the business or traffic of people using a given system can determine the selection process in the sense that a high traffic or busy system will require more sophisticated access control systems.

Reference no: EM132233673

Questions Cloud

Discuss three challenges that cloud organizations could face : Companies that collect data on citizens in European Union (EU) countries will need to comply with strict new rules around protecting customer data by May 25.
What steps can companies take to protect trade secrets : What steps can companies take to protect trade secrets? With more persons working from home, how does one separate data intended for the employer.
How does the choice of encryption impact vpns : Encryption and a secure VPN are virtually inseparable. A secure VPN exists only because its traffic is encrypted. But some trusted VPNs may or may not use.
Develop a network diagram using microsoft visio : As an IT networking trainee for your organization, your supervisor has given you an assignment to extend the Mayberry Network to an additional space.
How system interacts or communicates with other resources : Access control is a procedure that is incorporated into an organization's information technology environment. The system identify and regulate the authorization
What would you do in the given situation : You are a professionally certified project manager working for a consulting company. Your manager has just let you know that you will be assigned to work.
Identify emerging technology that poses ethical challenges : Conduct research and find one article that identifies one emerging technology that poses ethical challenges. Describe the technology and ethical issues raised.
Write an essay describing that information : There may be personal information that you want considered as part of your admissions application. Write an essay describing that information.
How you would remain anonymous and avoid detection : Imagine for a moment that you are a hacker, an ethical one. You are called upon by law enforcement to hack into a business network known to be engaged.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write a program that will take inputs and store in text file

Write a program that will take 3 inputs and store in a text file. Input one will be a song title, two will be its highest place .

  Create an activity diagram for the product sale subsystem

CSE2ISD –Information Systems Development - La Trobe University - Create asequence diagram for the process of a customerselecting products and completing

  Decompose the application using data flow diagrams

Decompose the application using data flow diagrams, system architecture diagrams, and a table describing the main components and users of the system;

  Testing the procedures

The company receives new release movies each Tuesday. Make a procedure that will enable the receiving clerk inorder to add the new movies received to the mm_movie table.

  Write a program to display running time of selection sort

Write a program to display running time of Selection Sort and Merge Sort. Search and download a C++ code of Selection Sort and Merge Sort from an online source.

  Convert a complex number in rectangular form

Write and test thoroughly a MATLAB function which converts a complex number in rectangular form.

  What would be your reaction to the given problem

One of your committee members has just learned that a particular system has blown out the competition in the SPEC CPU2000 benchmarks. He is now insisting that the committee buy one of these systems. What would be your reaction to this?

  Write an automated censor program

Write an automated censor program that reads in the text from a file and creates a new file where all of the four- and five-letter words have all but their.

  Calculate the batting average

A walk does not count as either a hit or a time at bat when you calculate the batting average. Which solution is best?

  What topics should be included in security education

Discussion why security awareness, education and training is important within organizations. What topics should be included in security education and training?

  Compare two architectural styles

Consider their flexibility, how easy they are to understand and use, and quality of applications they might  produce. Discuss any experiences you have had using these patterns. How has your prior training and preparation influenced your evaluation..

  Make modifications so that the code can handle any screen

The weather station implementation is only suitable for a 600 x 800 screen display. Make modifications so that the code can handle any screen dimensIOns.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd