CMIT425 Week 5 assignment.docx - Running Head: CMIT 425...

This preview shows page 1 - 4 out of 6 pages.

Running Head:CMIT 425 Week 5 Assignment1Week 5 AssignmentCMIT 425 Advanced Information Systems SecurityApril, 2019
CMIT 425 Week 5 Assignment21.Access controls are security features that are usually considered the first line of defensein asset protection. They are used to dictate how subjects access objects, and their maingoal is to protect the objects from unauthorized access. Access control models areframeworks that use access controls to enforce the rules and objectives of the model. Inyour essay response, compare the different Access Control Models and give an exampleof one that you have used in a work situation or if that is not possible, one that you’veread about in a scholarly article.2.Relying on a password to secure access to a system does not provide enough security intoday’s complex world. The Office of Personnel Management learned this the hard wayin 2015. Since OPM was hacked and it was learned that the attackers compromised theirsystem administrator accounts that were protected only with passwords, the Federalgovernment has required the use of multifactor authentication for privileged accounts.Describe the three factors that can be used in authentication and give at least twoexamples for each.3.There are two main methods of access control administration that an organization canchoose between to achieve the level of protection that they need to secure their assets andinformation: centralized and decentralized. Describe the RADIUS, TACACS, andDIAMETER forms of centralized access control administration. What are the advantagesand disadvantages of decentralized administration?
CMIT 425 Week 5 Assignment31.Discretionary Access Control (DAC) –Every object has an owner, and the owner cangrant access to any other subject. The creator of an object is automatically granted ownerprivileges. The owner has the discretion of who can and cannot access the object. Accessto these object is managed via Access Control List (ACL), which is used to verify whichsubjects can access the object, and what special privileges they have. The most commonDAC is Windows operating system’s New Technology File Systems (NTFS) (Chapple,Stewart, & Gibson, 2018).

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 6 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
N/A
Tags

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture