Question

Discuss the implementation steps for implementation of an access control system for PC workstation access. Be...

Discuss the implementation steps for implementation of an access control system for PC workstation access. Be sure to include rollout details on how it would be phased in and the old technology phased out, as well as user training and other auxiliary activities.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

ANSWER:

Access control is a completely critical element of PC access. It makes helpful that an valid one can access simply what they're certified to and not everything superior than that.

We want to implement the below cite safety measures used for to put into achieve find right of opening to organize machine for pc computer access:-

Authentication: - It miles the method of figure out the identity of a client & the host that he is the procedure of the 1st objective of verification is to confirm that the client who is attempting to hold mutually with your device is acceptable to realize that. The 2nd goal is to assemble facts regarding the method that the someone is having access to the device.

Strategies to be followed to identify a customer:

1.user id & password

2.protection device like VPN token

3.Biometric identification

Authorization: - It far the method of figure out the point of getting permission to which a certified person has to the perform & details.

Database Implementation strategies: - The procedure of role is a regular plan which is utilize by a significant range of technologies and not simplest databases, which will shorten the safety managing challenge. Permission can be enforced within the database by method of extend system that may be blend. Those strategies are:

1.Permissions

2.Perspectives

3.Stored procedures

4.Proprietary techniques

The major purpose of database security is to make confident that there must now not be any backdoor get right of entry to significant company facts.

Object-orientated Implementation techniques: - Gadgets summarize both the information and data. An object-orientated authorization approach must include the capacity to relaxed each. Our function is to assert thru testing and inspections, that the managerial safety approach is being followed.

Patterns for permitting utility security are:

1.Take a look at factor

2.Full View With mistakes

3.Restricted View

4.Roles

5.Consultation

Authorization can be functional with the items by following a diffusion of strategies. those strategies encompass:

1.Brute force

2.Enterprise policies engine

3.Permissions

4.Security framework/issue

5.Security server

6.Factor-orientated programming (FOP)

7.Effective safety strategies

We must base our security approach on the true requirements.

We want to strive for a company security strategy, however, it must be practical.

We need to not over do security

We must provide humans simplest the get admission to that they need

Permissions ought to be restrained to a small set of hosts

Audit manage and logging must be applied

Add a comment
Know the answer?
Add Answer to:
Discuss the implementation steps for implementation of an access control system for PC workstation access. Be...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • You work for EGS Testing Solutions; your company is involved in testing related to access control...

    You work for EGS Testing Solutions; your company is involved in testing related to access control systems. A large, private fitness club contacted your company because their Web server was hacked. The fitness club has a corporate office with 50 workstations, 4 application servers, 2 e-mail servers, 2 Web servers, and 129 franchisees with 10 workstations and about 3,500 members at each location. Except for the equipment at the franchisees’ locations, all other equipment resides at the central headquarters. The...

  • A software manager is in charge of the development of a safety-critical software system, which is designed to control a radiotherapy machine to treat patients suffering from cancer.

    Questions: A software manager is in charge of the development of a safety-critical software system, which is designed to control a radiotherapy machine to treat patients suffering from cancer. This system is embedded in the machine and must run on a special-purpose processor with a fixed amount of memory (256 Mbytes). The machine communicates with a patient database system to obtain the details of the patient and, after treatment, automatically records the radiation dose delivered and other treatment details in the...

  • A computerized data-management system that supports several activities—such as order entry, result retrieval, documentation, and decision-support...

    A computerized data-management system that supports several activities—such as order entry, result retrieval, documentation, and decision-support across locations—would MOST accurately be considered a(n) ________. Group of answer choices clinical information system administrative information system hospital information system database To design a nursing system that will enhance usability by the nurse user requires that ________. Group of answer choices the design be developed with the patient in mind knowledge of systems from other industries be used the technology use of the...

  • Which role has the PRIMARY responsibility for the documentation of control implementation? Systems security engineer Control...

    Which role has the PRIMARY responsibility for the documentation of control implementation? Systems security engineer Control assessor Information System Owner (ISO) Information Owner/Steward When making determinations regarding the adequacy of common controls for their respective systems, Information System Owner (ISO) refer to the Common Control Providers’ (CCP) Privacy Impact Assessment (PIA) Business Impact Analysis (BIA) Authorization Packages Vulnerability Scans An organization-wide approach to identifying common controls early in the Risk Management Framework (RMF) process does which of the following? Considers...

  • In 2015, Singh Manufacturing implemented a Web-based information system that allows all employees to access mission-critical...

    In 2015, Singh Manufacturing implemented a Web-based information system that allows all employees to access mission-critical information. The intention was to increase production efficiency. Unfortunately, it had the opposite effect, as deliveries fell behind schedule and costs increased. Shaman Gupta, the director of information technology services, asked Ashlee Wells to come in and talk with him about the system. Ashlee is a long-time employee of Singh, and her opinion is valued by her peers and by her supervisor. "So Ashlee,...

  • Option 1: Authentication System For security-minded professionals, it is important that only the appropriate people gain...

    Option 1: Authentication System For security-minded professionals, it is important that only the appropriate people gain access to data in a computer system. This is called authentication. Once users gain entry, it is also important that they only see data related to their role in a computer system. This is called authorization. For the zoo, you will develop an authentication system that manages both authentication and authorization. You have been given a credentials file that contains credential information for authorized...

  • Competency Design the steps to justify an information system initiative. Scenario Information BeGood Baking Supply is...

    Competency Design the steps to justify an information system initiative. Scenario Information BeGood Baking Supply is a small bakery supply company formed as a closely held corporation. The company supplies raw baking materials, paper goods, and equipment to restaurants and bakeries in three states in the upper mid-west. Most of its business, however, is located in a large metropolitan area. BeGood wants to increase its presence in the region and serve five states. In fact, the owners of BeGood would...

  • Question 1: Explain three major information system trends and explain how the Internet and the WWW...

    Question 1: Explain three major information system trends and explain how the Internet and the WWW are related to information systems. Question 2: E-Business has many characteristics. Discuss this statement then explain the challenges as well as opportunities of globalization. Question 3: Explain the four primary properties that determine the value of information. United Parcel Service Inc. (UPS), is a global company with one of the most recognised and admired brands in the world, using information systems, access to global...

  • I need help with the Implementation of an Ordered List (Template Files) public interface Ordered...

    I need help with the Implementation of an Ordered List (Template Files) public interface OrderedStructure { public abstract int size(); public abstract boolean add( Comparable obj ) throws IllegalArgumentException; public abstract Object get( int pos ) throws IndexOutOfBoundsException; public abstract void remove( int pos ) throws IndexOutOfBoundsException; public abstract void merge( OrderedList other ); } import java.util.NoSuchElementException; public class OrderedList implements OrderedStructure { // Implementation of the doubly linked nodes (nested-class) private static class Node { private Comparable value; private...

  • Wanted by the Police: A Good Interface By KATIE HAFNER NOV. 11, 2004 From: The New...

    Wanted by the Police: A Good Interface By KATIE HAFNER NOV. 11, 2004 From: The New York Times, Technology section, not-for profit classroom used. SAN JOSE, Calif. - SAN JOSE has a reputation as one of the safest large cities in the nation, with the fewest police officers per capita. Yet a number of the 1,000 officers in this city of 925,000 in the heart of Silicon Valley have been worrying about their own safety of late. Since June, the...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT