OCU ISCAP A Week 01 Lesson 04 Discussion

Viewing 2 reply threads
  • Author
    • #91479
      Manny Varela

      Choose one of the following to discuss in detail.  Give at least 4 examples that include information from the text and videos (at least 2 examples from each).

      1. Access control characteristics and threats to access control.
      2. Information Classification: Reasons, criteria, levels, and benefits.
      3. Access Control Models and Technologies: models, and model types
      4. Access Control Methods: administration, RADIUS pros, cons, and characteristics
    • #91781
      Aaron Elliott

      Access control characteristics prevent unauthorized users access to business facilities and assets. Access controls include software measures, along with administration and physical measures. software access controls relate to passwords, two factor authentication, and user monitoring when access is granted. The administration access control includes security policies to regulate associate behavior with company networks and training. The physical access control would include keeping assets behind locked doors, usually with a security guard for a mantrap or under camera surveillance. Fences around the property, among other attributes to prevent physical robbery of assets.

      Threats to access controls would be for the software side phishing emails to steal credentials of associates who do not have two factor authentication set up. Administrative threats would be no policy enforcement, so associates are not held to secure their access credentials properly. Physical threats could include natural and human sources, such as fires or floods destroying assets. While man threats could be piggybacking associates into the facility.

    • #91823
      Aaron Elliott


Viewing 2 reply threads
  • You must be logged in to reply to this topic.


Please Note:

The support ticket system is for technical questions and post-sale issues.


If you have pre-sale questions please use our chat feature or email .

Cybersecurity Certifications for Today's INFOSEC Careers

Mile2 Cybersecurity Certifications is a world-leader in providing accredited education, training, and certifications for INFOSEC professionals. We strive to deliver the best course ware, the strongest Cyber Range, and the most user-friendly exam system in the market.


Our training courses follow our role-based Certification Roadmap. Plus, many of our classes include hands-on skill development in our Cyber Range.  We train students in penetration testing,disaster recovery, incident handling, and network forensics.  Additionally, our Information Assurance training certification meets military, government, private sector and institutional specifications.  



We've developed training for...

Canada Army Navy Airforce

The Canadian Department of National Defense


The United States Air Force

Defense Logistics Agency

A United States Counterintelligence Agency

Texas Workforce Commission

Texas Workforce Commission

error: Alert: Content is protected !!