Mile2 Cybersecurity Certifications

Reply To: OCU C)ISSO D Discussion Lesson 04

#85710
Kevin Mehok
Participant

IST3100 Information Systems Security Officer
Week One
Discussion #4
Kevin Mehok

How is access to IT systems and data controlled? Well this week we have each learned that over time the ways in which IT systems can be accessed has grown, and the job of securing those system and their data has become increasingly more complex (Precisely, 2023). High-profile breaches have spawned a host of compliance regulations that further expanded the ways and thus the complexities in which organizations needed to secure their systems and protect sensitive data (Precisely, 2023).

Access control systems perform identification authentication and authorization of users and entities by:

Strengthening logon security through multi-factor authentication
Restricting user privilege through elevated authority management solutions
Granting requests for access to systems and data based on the identity of the user and the context of the request (Precisely, 2023).
A complete system access control solution requires a layered defense to protect access control systems (Precisely, 2023).

How is system access control performed? Well, once again, we have learned this week that a system access control solutions determine how users are allowed to interact with specific systems and resources (Precisely, 2023). A robust system access control regime gives an organization the ability to manage, restrict, and monitor user activity while protecting sensitive systems and data (Precisely, 2023).

God Bless,

Kevin

References:

https://www.precisely.com/glossary/system-access-control

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .