Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Week 9 Discussion What access control methods does your work employ - both physi

ID: 3858324 • Letter: W

Question

Week 9 Discussion

What access control methods does your work employ - both physical and digital? Do you think they are effective? Of you are not currently employed, do you use access control methods on your digital devices?

What ways would you go about attacking those access controls? Does thinking about it in this manner make you look at those controls differently, and if so, what would you change to make them stronger?

Book name:

CompTIA Security+ SY0-401 Cert Guide, Academic 1st Edition, Pearson. ISBN-13: 978-0789753632 ISBN-10: 0789753634

Explanation / Answer

What access control methods does your work employ - both physical and digital? Do you think they are effective?

Access control is a security technique its a part of GRC product. Which is used to regulate who or what
can view or use resources in a computing environment.

There are two main types of access control first is physical and second is logical.

Physical access control limits access to campuses, buildings, rooms and physical IT assets.

Logical access limits connections to computer networks, system files and data.

They can be effective because it has different categories of access control
they are mainly four types which are:
- Mandatory access control
- Discretionary access control
- Role-based access control
- Rule-based access control


Of you are not currently employed, do you use access control methods on your digital devices?

Mainly in corporate world or IT environemnt he employee generally use Role-based access control.

Role-based access control is a method of regulating access to computer or network resources based on
the roles of individual users within an enterprise or a company.

In Role-based access control roles can be easily created, changed, or discontinued as the needs
of the enterprise users, without having to individually update the privileges for every user.


What ways would you go about attacking those access controls? Does thinking about it in this
manner make you look at those controls differently, and if so, what would you change to make them stronger?

There are many different ways to attack the access controls and to make them stronger. In access control we
are having many different methods like:
- Attribute-based Access Control (ABAC)
- Identity-Based Access Control (IBAC)
- History-Based Access Control (HBAC)
- Rule-Based Access Control (RAC)
- Role-Based Access Control (RBAC) etc.

So by using the above methods we can resolve the access controls and also we can make them stronger.

And also the Access control systems provide services of authorization, identification and authentication,
access approval, and accountability to the users and also it make them secure in all aspects.

We can also make the access control more stringer by using the Network Access Control.
The computer security that attempts to unify endpoint security technology in Network Access Control

When a computer connects to a computer network, it is not permitted to access anything unless it complies with a business defined policy including anti-virus protection level, system update level and configuration.

While the computer is being checked by a pre-installed software agent, it can only access resources that can
remediate any issues.

So in my point of view by using the access control method we can not only secure the user but also we can
secure the enterprise or a company with high security.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote