Question

In: Computer Science

Most IT professionals are familiar with the basic concepts surrounding authentication and access control systems. There...

Most IT professionals are familiar with the basic concepts surrounding authentication and access control systems. There are fewer professionals who have taken the time to consider the more granular characteristics of these controls and the options that are available for differentiation, selection, and implementation.

  • Describe the combination of authentication and access controls that you believe best balance cost, complexity, and security. Support your position.
  • Explain how domain trusts, isolation technologies, and the separation and organization of those technologies can support a network security strategy.
  • Describe an example of how encapsulation or encryption contribute to a specific access control or authentication solution.

Solutions

Expert Solution

Combining authentication and access control:

Both these ways are very crucial for security of the network. By combining these two one can ensure that the system has verified users given access to it. With the security in place, the chances of compromising security are less and the cost and complexity are also balanced out. There are many research methodologies in which these two methods are combined together. Such a framework is used to offer a cryptographic solution to the organizations as well. The user can access only what is important for them and what they are given access to. Especially when there are many groups of people this method works the best. It keeps the data confidential and secures the ownership of the user as well.

Domain trust, isolation, and separation of technologies:

Domain trust is very important for an organization. It is also important to use effective strategies pertaining to isolation of various protocols and technologies. The separation helps in limiting the impact of intrusion in the network. If it is done correctly, it can make it hard for the attacker to gain access and locate the data sensitive to the system. It decreases the malicious attempts in the system.

It also acts as a prime firewall in the network.

Example of encapsulation/encryption:

One of the best examples would be in the communication links between a browser and a website. These links are usually encrypted using SSL or secure sockets layers. The messages exchanged between browser and the website traverse huge distances and ultimately pass through different machines and devices on the way to the destination. However, because of the link encryption, it is hard for the malicious users to stop them in between and read the message.


Related Solutions

Describe the difference between authentication and access control. How do each of these concepts support the...
Describe the difference between authentication and access control. How do each of these concepts support the confidentiality and integrity of the data they protect? How does the “principle of least privilege” increase this support on the access control side? Describe how multi-factor authentication increases the confidence that someone is who they claim to be (i.e. that the person logging in is actually that person.)
Introduction - Please briefly explain what is meant by Access control/Authentication/Authorization, the role this plays in...
Introduction - Please briefly explain what is meant by Access control/Authentication/Authorization, the role this plays in securing a network and the importance of having policies about Account naming conventions and password management. Account naming convention - What are the suggested format(s) for user accounts to be named? i.e. johndoe, jdoe, john.doe, user1, etc.... Be sure that your account naming convention provides a way to create a unique account name for folks with the same names.   Password length and complexity -...
While most of us are quite familiar with traditional western financial systems, most of us have...
While most of us are quite familiar with traditional western financial systems, most of us have little or no exposure to financial transactions under the Islamic system. Please provide a comparative discussion of the differences between Western finance and Islamic finance and provide at least 2 examples of how certain transactions in the western system would be reconfigured to comply with the restrictions governing the Islamic system.
What are some physical security design elements for alarm/access control systems servers?
What are some physical security design elements for alarm/access control systems servers?Why is Physical Security design elements for alarm/access control systems/servers so crucial in a data center?
Question with regards to Statistical Process Control. Control chart systems can operate on two basic methods...
Question with regards to Statistical Process Control. Control chart systems can operate on two basic methods of measurement. State these two methods and briefly distinguish between them, giving three examples of industrial processes where each might be applied. Specify an appropriate sampling procedure in each case.
300 WORDS REQUIREMENT!!! Review the basic control concepts and why a code of ethics and internal...
300 WORDS REQUIREMENT!!! Review the basic control concepts and why a code of ethics and internal controls are important.
What kinds of access control models are most central to securing critical health data?
What kinds of access control models are most central to securing critical health data?
What are the basic concepts of energy, entropy, temperature and Balzmann Distribution. Use weight and most...
What are the basic concepts of energy, entropy, temperature and Balzmann Distribution. Use weight and most probable distribution to connect them.
Control chart systems can operate on two basic methods of measurement. State these two methods and...
Control chart systems can operate on two basic methods of measurement. State these two methods and briefly distinguish between them, giving three examples of industrial processes where each might be applied. Specify an appropriate sampling procedure in each case.
Data for the next 2 questions: Tamara Company sells two types of control systems – Basic...
Data for the next 2 questions: Tamara Company sells two types of control systems – Basic and Deluxe - as follows: Selling price per unit Variable expense per unit Basic $120 $90 Deluxe $280 $220 Fixed monthly expenses total $300,000. The expected sales mix in units is 60% for product Basic and 40% for Deluxe. 1. How many units of each product must be sold each month in order to breakeven? 2. How many units of each product must be...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT