Unit 4 Assignment - Running head Access Control 1 Unit 4 Assignment Access Control Olympia Antonio Kaplan University Access Control 2 Access Control In

Unit 4 Assignment - Running head Access Control 1 Unit 4...

This preview shows page 1 - 4 out of 8 pages.

Running head: Access Control 1 Unit 4 Assignment: Access Control Olympia Antonio Kaplan University
Image of page 1
Access Control 2 Access Control In the new age technology is always changing to help benefit everyone and companies have to stay up to date with the technologies to make their business strong. Remote accesses are making it easier for employees to do their jobs in an effective manner. For a company to understand and benefit from remote accesses they must also understand access control and authentication within their network. Authentication is a way of making sure that the correct employees is access the network and information that is meant for them. There are three factors of authentication that a company may use to help keep their information secure from outside attacks. “Each factor meets certain needs, the factors are: something you know, such as a password or PIN, something you have, such as a smart card, token, or an identification device, and something physically unique to you, such as your fingerprints or retinal pattern” (Dulaney, 2013). Single factor authentication is basically the essential things that are used in a company, which can be an employee’s username and password to be able to login to the company’s network. Each user name and password is unique and designed for only that one employee. This helps to keep the network secure but while it may seem like a good thing there are security risks. Some employees will write down their user name and passwords and leave them where anyone can see them, thus making the network no longer secure. A multifactor authentication means using two or more tools to keep a network secure. Basically you can use a smart card reader along with a user name and password to make sure the employee accessing the data is the right person. It also helps to make sure that you are not using the same factors. For example if you use a password and a smart card then there is no need to use a token since the smart card is being used. When using a multifactor authentication method
Image of page 2
Access Control 3 there can be disadvantages to the system if one thing is missing or goes wrong than it can make
Image of page 3
Image of page 4

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture