logo

Access Control Essay | Information Systems Assignment

7 Pages1334 Words273 Views
   

Added on  2020-04-07

Access Control Essay | Information Systems Assignment

   Added on 2020-04-07

ShareRelated Documents
Running head: ACCESS CONTROLAccess ControlName of the StudentName of the UniversityAuthor Note
Access Control Essay | Information Systems Assignment_1
1 ACCESS CONTROLTable of Contents1. Introduction......................................................................................................................22. The Access control methodologies..................................................................................23. Conclusion.......................................................................................................................54. References........................................................................................................................6
Access Control Essay | Information Systems Assignment_2
2 ACCESS CONTROL1. Introduction The organization ORD is an organization of 4000 staffs in the various departments. Theground level of the building includes entrances, training rooms, computer labs and theworkstations. Proper access control is to be implemented in from controlling the access andmonitoring the access of the workstations. Access control is a selective restriction of the accessto a place or a resource1. The access here refers to the consuming, entering or using. Differentlocks and the login credentials of the access control mechanism can be imposed for controllingthe access to the workstations of the building. The different physical and logical access controlmechanism that can be employed for the workstation are discussed in the following paragraphs 2-2. The Access control methodologies The entry to the organization is through the main entrance of the ground floor or throughthe parking lot that is situated in the basement. There is only one main door of entrance to thebuilding apart from few fire exists. The fire exits can be accessed only during an emergency, as itneeds the breaking of the glass plane for its access. Therefore, a CCTV surveillance would beenough for access control or monitoring who are taking advantage of the fire exits in accessingthe building 3. The access control methodology can be broadly divided into two phases physical andlogical. The physical access control is mainly used for controlling the access to the campuses,building, rooms and different physical IT assets. Logical access limits the access of the computernetworks, system files and the data. 1 Hu, Vincent C., D. Richard Kuhn, and David F. Ferraiolo. "Attribute-based access control."Computer48,no. 2 (2015): 85-88.2 Fennelly, Lawrence.Effective physical security. Butterworth-Heinemann, 2016.3 Nam, Yunyoung, Seungmin Rho, and Jong Hyuk Park. "Intelligent video surveillance system: 3-tiercontext-aware surveillance system with metadata."Multimedia Tools and Applications57, no. 2 (2012): 315-334.
Access Control Essay | Information Systems Assignment_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security and Vulnerabilities : Assignment
|11
|2140
|57

National Institute of Standards and Technology (NIST) Cyber Security Framework and Terminologies
|11
|1515
|26