logo

Access Control TABLE OF CONTENTS

   

Added on  2021-02-20

7 Pages1683 Words344 Views
 | 
 | 
 | 
ACCESS CONTROL
Access Control TABLE OF CONTENTS_1

TABLE OF CONTENTSAccess Control ................................................................................................................................1Effectiveness of the access control .................................................................................................1User Privilege ..................................................................................................................................2Effective use of IPSec VPN.............................................................................................................2Effectiveness of hardening the devices............................................................................................2Security features of hardware devices.............................................................................................3REFERENCES................................................................................................................................5
Access Control TABLE OF CONTENTS_2

Access Control Ii is network filter used by switches and routers for permitting and restricting data inflowand outflow from network interfaces. Data passing by interface is analysed by network device onconfiguration of access control over interface and makes judgement about whether to allow flowor to restrict it after comparing it with given criteria. Access control is installed in an organisation for number of reasons like providing initialsecurity to network. They are used for protecting high speed interfaces in companies where linespeed is essential and for restricting updates to route from networking peers and also forcontrolling network traffic (Access Control. 2019). They are not robust or complex like statefulfirewalls than also they are offering significant firewall capability. IT professional should becapable of protecting networks, assets & data (Dupont, Srinivasan and Andrus, 2016). Placementof ACL's should be done over external routers for filtering traffic. Effectiveness of the access control The advancement of access control requires the company to ensure their effectiveness. Foreffective access control company is required to lay down procedure that will be keeping thesoftware protected for the hackers and other outsiders. Access control should be workingcomprehensively in the organisations so that there are no defects in functioning of softwares.Deep customization are to be performed by company in access control. Access control includerestriction of physical access to the IT devices that can reveal the information about thecompany. For the effectiveness of access control systems it should install new methods thataenhance the existing control.Company has to ensure regular updation of the control system so that the existing systemdo not lose its effectiveness. As the too old access control will be prone to more cyber attacksbreaking the security. Access control system should be easy so that it could be managedproperly. The access control design should have intuitive use so that it can control the dataprocessing more accurately (Sawhney, Conover and Montague, 2015). For identification,authorization and authentication of users new credentials should be given so that system can beaccessed by only authorised users. This will prevent the access of data by external users. Accesscontrol systems should be managed regularly by the controlling executives so that loopholes areidentified at their initial stages protecting the security of company. 1
Access Control TABLE OF CONTENTS_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents