Question

In: Computer Science

How are access control policies different between industries?

How are access control policies different between industries?

Solutions

Expert Solution

Answer)
Access control policies are the policies which are used for minimizing the risk to control the unauthorized access to the physical and logical systems such as access to the building which represent physical and access to the systems or software application which represent the logical systems. Thus the access control policies are the ones which are used to protect the confidential systems and places and protect the data and access to that data, such as customer, employee and other types of confidential data.

The access control policies are there and are different between the industries, such as industries which handle data security policies are thus handling the application and software level and logical access control policies where we need the access control policies to control the confidential data. One another type among many types of access control policies can be the physical access control which can also be for the business and industries which focus on physical security and which are the actual kinds of security they need.

Thus the access cards and punch cards which can be sued to provide the physical access to the doors and buildings can be examples of the access control policies for physical mediums. Thus, what we really understand is that the access control policies whether logical or physical are different actually from the industry to industry and depending on the type of our requirements.


Related Solutions

Describe the difference between authentication and access control. How do each of these concepts support the...
Describe the difference between authentication and access control. How do each of these concepts support the confidentiality and integrity of the data they protect? How does the “principle of least privilege” increase this support on the access control side? Describe how multi-factor authentication increases the confidence that someone is who they claim to be (i.e. that the person logging in is actually that person.)
In reference to network access control, describe some of the access control mechanism used by a...
In reference to network access control, describe some of the access control mechanism used by a network administrator to filter, inspect and detect different forms of traffic.
How are a “small” economy’s policies different from a “large” economy’s policies?
How are a “small” economy’s policies different from a “large” economy’s policies?
Access control" - Several "Access control" best practices were introduced this week. What is the goal...
Access control" - Several "Access control" best practices were introduced this week. What is the goal of "Access control"? Which "Access control" best practices would you recommend be implemented in a company accounting department?
How do the IEEE 802.1x standards improve network access control?
How do the IEEE 802.1x standards improve network access control?
Explain, in your own words, the difference between access and control views of informational privacy, and...
Explain, in your own words, the difference between access and control views of informational privacy, and describe a case in which a proponent of the access view and a proponent of the control view would disagree about whether an individual had privacy.
Role-based access control (RBAC), an accepted model for access control in enterprise environments, may provide the...
Role-based access control (RBAC), an accepted model for access control in enterprise environments, may provide the means for conditions effectively restrict access based on rules and prerequisite conditions. However, there may be weaknesses in this approach. Provide strengths and weaknesses of role-based access control use in any size organization of your choice.
Command-and-control policies and market-based policies are policies used to deal with externalities.
  1. Command-and-control policies and market-based policies are policies used to deal with externalities. Provide a specific example of each policy in the economy today and explain how they work. 2. “Any public good is worth producing because it benefits so many people.” Do you agree with this statement? If not, how would you decide which public good should be produced and which should not? 3. Explain why there is excess environmental pollution in our society?
A document that describes policies to control how computer resources are used is an example of:
A document that describes policies to control how computer resources are used is an example of:
in ACL (access control List) : 1.How do you determine who can access object x? 2....
in ACL (access control List) : 1.How do you determine who can access object x? 2. How do you determine which objects user y can access? 3. What happens if a file is deleted?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT