- This topic has 2 replies, 4 voices, and was last updated 2 years, 5 months ago by
Aaron Elliott.
- AuthorPosts
-
- October 31, 2023 at 12:15 pm #91479
Manny Varela
KeymasterChoose one of the following to discuss in detail. Give at least 4 examples that include information from the text and videos (at least 2 examples from each).
- Access control characteristics and threats to access control.
- Information Classification: Reasons, criteria, levels, and benefits.
- Access Control Models and Technologies: models, and model types
- Access Control Methods: administration, RADIUS pros, cons, and characteristics
- November 10, 2023 at 7:53 pm #91781
Aaron Elliott
ParticipantAccess control characteristics prevent unauthorized users access to business facilities and assets. Access controls include software measures, along with administration and physical measures. software access controls relate to passwords, two factor authentication, and user monitoring when access is granted. The administration access control includes security policies to regulate associate behavior with company networks and training. The physical access control would include keeping assets behind locked doors, usually with a security guard for a mantrap or under camera surveillance. Fences around the property, among other attributes to prevent physical robbery of assets.
Threats to access controls would be for the software side phishing emails to steal credentials of associates who do not have two factor authentication set up. Administrative threats would be no policy enforcement, so associates are not held to secure their access credentials properly. Physical threats could include natural and human sources, such as fires or floods destroying assets. While man threats could be piggybacking associates into the facility.
- November 14, 2023 at 8:13 pm #91823
Aaron Elliott
Participanttest
-
- AuthorPosts
- You must be logged in to reply to this topic.