Question

In: Computer Science

Access control can be considered as the central element of computer security. Question 4(a), 4(b), 4...

Access control can be considered as the central element of computer security. Question 4(a), 4(b), 4 (c) and 4(d) based on this information.

4 (a). Relate the principal objective of computer security with the function of access control.

4 (b). Briefly explain how access control being implemented in the machine.

4 (c). If Process A requires 500MB of memory space to perform calculation and Process B requires 100MB of memory space to perform graphics processing, identify the object, subject and access operation in this scenario. Provide explanation for your answer.

4 (d). Company RT wants to have different access levels for each of its users. A management level employee will have more privileges to files and operations. The executive level will have moderate privilege to the files but individual users will have their own level of control to the files they own. Which type of access control is suitable for this company and its employee? Clearly explain and justify your answer.

Solutions

Expert Solution

(a) The main objective of computer security are:confidentiality,integrity,and availability.By implementing confidentiality we can prevent the disclosure of confidential information to the unauthorized users.Integrity refers to the accuracy and consistency of data and systems.Modification of data by unauthorized users have to be prevented here.Availability ensures all the defined service to be available to the authorized users.

Access control is actually the mechanism to minimize the security risk of unauthorized access .It can be physical or logical.Physical access control limits the access to physical entities like rooms,building and other IT assets.But logical access limit the access to system data files,network etc.

By implementing access control we can avoid the unauthorized access and thereby able to achieve the principal objective of computer security.

(b) Physical access we can implement through biometric systems like punching cards,face recognition,eye recognition etc.By providing user rights for databases and applications we can implement logical access control.

(d) Role based Access control is the best method we can adopt here. Here based on individuals or groups we can give the authorization.Here we can seperate the groups into management level employee,executive level employee,users etc.Then based on the role,authorization can be done.


Related Solutions

You can use up to three levels of security and protection to control who can access...
You can use up to three levels of security and protection to control who can access and change your Excel data. Please describe two of the three levels and how you access each of them.
Computer Security Bell-LaPadula Model Given the access rights as follows: Nada can read and write to...
Computer Security Bell-LaPadula Model Given the access rights as follows: Nada can read and write to file A, can append to file B, and can write to file C. Maha can read file A, can write to file B, and cannot access file C. Write the access control matrix M that specifies the described set of access rights for subjects Nada and Maha to objects file A, file B and file C. Then the subject’s security levels are LNada= Confidential...
For Network Access Control and Cloud Security You are required to research and report on this...
For Network Access Control and Cloud Security You are required to research and report on this topic according to the Detail of Question below. A. Select one paper to: Read, understand in order to present three main parts: 1. Summary: o Provide a 200-300 word summary of the paper under review, from the background to the results being presented, and further work proposed. Please do NOT copy the abstract into this space! 2. Main points: o The main issues as...
Explain how designing an access control standard relates to system security practices.
Explain how designing an access control standard relates to system security practices.
Suggest possible security strategies needed to support encryption and network access control.
Suggest possible security strategies needed to support encryption and network access control.
Assume that you are an IT Security Manager who needs to develop access control policies for...
Assume that you are an IT Security Manager who needs to develop access control policies for the following areas: networking, server administration, database administration, and physical security. Choose one area and develop five actual policies that you could provide your employees. Please explain your choices and why these policies are important.Assume that you are an IT Security Manager who needs to develop access control policies for the following areas: networking, server administration, database administration, and physical security. Choose one area...
What kinds of access control models are most central to securing critical health data?
What kinds of access control models are most central to securing critical health data?
What are some physical security design elements for alarm/access control systems servers?
What are some physical security design elements for alarm/access control systems servers?Why is Physical Security design elements for alarm/access control systems/servers so crucial in a data center?
URGENT JAVA Develop a Java computer program to simulate access control to a system network. The...
URGENT JAVA Develop a Java computer program to simulate access control to a system network. The username and password authentication mechanism is used as an access control mechanism in this project. The program needs to authenticate the user with their username and hashed password stored in Access Manager User (AMU) file. To create an Access Manager User file, you need to develop a java program that takes username and password as input and then generates a file containing the username,...
Recall that a set B is dense in R if an element of B can be...
Recall that a set B is dense in R if an element of B can be found between any two real numbers a < b. Take p∈Z and q∈N in every case. It is given that the set of all rational numbers p/q with 10|p| ≥ q is not dense in R. Explain, using plain words (without a rigorous proof), why this is. That is, present a general argument in plain words. Does this set violate the Archimedean Property? If...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT