Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Chapter 6 1. Discuss the role of access control in information systems, and iden

ID: 3754398 • Letter: C

Question

Chapter 6 1. Discuss the role of access control in information systems, and identify and discuss the four fundamental functions of access 2. Define authentication and explain the three commonly used 3. Describe firewall technologies and the various categories of 4. Discuss the various approaches to control remote and dial-up 5. Describe virtual private networks (VPNs) and discuss the 6. Explain how technical controls are essential in enforcing policy for control systems authentication factors firewalls access by authenticating and authorizing users technology that enables them many IT functions that do not involve direct human control. 7. Explain that access control is the method by which systems determine whether and how to admit a user into a trusted area of the organization. 8. Explain how a firewall prevents specific types of information from moving between an external network, known as the untrusted network, and an internal network, known as the trusted network. 9. Discuss how the firewall may be a separate computer system, a software service running on an existing router or server, or a separate network containing a number of supporting devices

Explanation / Answer

1) In the terms of information security, access control is selective restriction of access, in particular place or a resource. Common definition of access can be defined as the flow of information between subject and a resource.

4 basic fundamentals of Access Control are stated as -

2) Authentication is a procesos or a action of proving something to be valid, something to be true. Authentication is required to prove that whatever data or resource available, is gurenteed to be true under any circumstances. Note that, authentication is different that authorization, where authorization is just a giving a certificate to the data, or a resource, which can be proved to be authentic data or authentic resource.

Authentication factors are divided into 3 sub types :

3) Firewalls are the basic network security system, that monitors and controls the incoming and outgoing traffic in the network based on the pre-defined set of rules.

4) Remote and dial-up access can be controlled by securing the login credentials of the user, using private networks or using third party security option such as vpn (Virtual Private Networks).

5) Vpn also called as virtual private networks offers most trusted communication channel between two end users. vpn creates, secure end to end tunnel like channel (which is virtual, thus cannot be seen) between two nodes ie, sender and receiver. All the data travels thorough that channel only. thus eliminating the risk of data tampering by malicious users. Note that all the incoming and outgoing data is in the Encrypted format in order to provide extra security mechanism.

(Sorry, as per chegg's rules and regulations, I cannot answer more than 4 questions, please divide your number of questions and repost them)

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote