Question

In: Computer Science

Most IT professionals are familiar with the basic concepts surrounding authentication and access control systems. There...

Most IT professionals are familiar with the basic concepts surrounding authentication and access control systems. There are fewer professionals who have taken the time to consider the more granular characteristics of these controls and the options that are available for differentiation, selection, and implementation.

  • Describe the combination of authentication and access controls that you believe best balance cost, complexity, and security. Support your position.
  • Explain how domain trusts, isolation technologies, and the separation and organization of those technologies can support a network security strategy.
  • Describe an example of how encapsulation or encryption contribute to a specific access control or authentication solution.

Solutions

Expert Solution

Combining authentication and access control:

Both these ways are very crucial for security of the network. By combining these two one can ensure that the system has verified users given access to it. With the security in place, the chances of compromising security are less and the cost and complexity are also balanced out. There are many research methodologies in which these two methods are combined together. Such a framework is used to offer a cryptographic solution to the organizations as well. The user can access only what is important for them and what they are given access to. Especially when there are many groups of people this method works the best. It keeps the data confidential and secures the ownership of the user as well.

Domain trust, isolation, and separation of technologies:

Domain trust is very important for an organization. It is also important to use effective strategies pertaining to isolation of various protocols and technologies. The separation helps in limiting the impact of intrusion in the network. If it is done correctly, it can make it hard for the attacker to gain access and locate the data sensitive to the system. It decreases the malicious attempts in the system.

It also acts as a prime firewall in the network.

Example of encapsulation/encryption:

One of the best examples would be in the communication links between a browser and a website. These links are usually encrypted using SSL or secure sockets layers. The messages exchanged between browser and the website traverse huge distances and ultimately pass through different machines and devices on the way to the destination. However, because of the link encryption, it is hard for the malicious users to stop them in between and read the message.


Related Solutions

Describe the difference between authentication and access control. How do each of these concepts support the...
Describe the difference between authentication and access control. How do each of these concepts support the confidentiality and integrity of the data they protect? How does the “principle of least privilege” increase this support on the access control side? Describe how multi-factor authentication increases the confidence that someone is who they claim to be (i.e. that the person logging in is actually that person.)
in the context of access control , explain the concepts of access control matrix, access control...
in the context of access control , explain the concepts of access control matrix, access control list ,privilege control list and capability
Introduction - Please briefly explain what is meant by Access control/Authentication/Authorization, the role this plays in...
Introduction - Please briefly explain what is meant by Access control/Authentication/Authorization, the role this plays in securing a network and the importance of having policies about Account naming conventions and password management. Account naming convention - What are the suggested format(s) for user accounts to be named? i.e. johndoe, jdoe, john.doe, user1, etc.... Be sure that your account naming convention provides a way to create a unique account name for folks with the same names.   Password length and complexity -...
While most of us are quite familiar with traditional western financial systems, most of us have...
While most of us are quite familiar with traditional western financial systems, most of us have little or no exposure to financial transactions under the Islamic system. Please provide a comparative discussion of the differences between Western finance and Islamic finance and provide at least 2 examples of how certain transactions in the western system would be reconfigured to comply with the restrictions governing the Islamic system.
Toolkit Exercise 10.3 Application of Simon’s Control Systems Model Consider a change you are familiar with...
Toolkit Exercise 10.3 Application of Simon’s Control Systems Model Consider a change you are familiar with (higher education change). 1.      Describe the control processes and measures that were used with the change (i.e., the belief, interactive, boundary, and diagnostic controls). When and how were they used and what was their impact?       a.    During the earlier stages of the change initiative       b.    During the middle stages of the change initiative       c.    During the latter stages of the change...
Question with regards to Statistical Process Control. Control chart systems can operate on two basic methods...
Question with regards to Statistical Process Control. Control chart systems can operate on two basic methods of measurement. State these two methods and briefly distinguish between them, giving three examples of industrial processes where each might be applied. Specify an appropriate sampling procedure in each case.
What are some physical security design elements for alarm/access control systems servers?
What are some physical security design elements for alarm/access control systems servers?Why is Physical Security design elements for alarm/access control systems/servers so crucial in a data center?
300 WORDS REQUIREMENT!!! Review the basic control concepts and why a code of ethics and internal...
300 WORDS REQUIREMENT!!! Review the basic control concepts and why a code of ethics and internal controls are important.
What kinds of access control models are most central to securing critical health data?
What kinds of access control models are most central to securing critical health data?
What are the basic concepts of energy, entropy, temperature and Balzmann Distribution. Use weight and most...
What are the basic concepts of energy, entropy, temperature and Balzmann Distribution. Use weight and most probable distribution to connect them.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT