logo

Types of Access Control | Information System Control and Auditing

   

Added on  2022-09-12

6 Pages1223 Words19 Views
Running head: INFORMATION SYSTEM CONTROL AND AUDITING
INFORMATION SYSTEM CONTROL AND AUDITING
Name of the Student
Name of the University
Author Note

1 INFORMATION SYSTEM CONTROL AND AUDITING
Table of Contents
Introduction................................................................................................................................2
Description.................................................................................................................................2
Conclusion..................................................................................................................................2
Referencing................................................................................................................................3

2 INFORMATION SYSTEM CONTROL AND AUDITING
Introduction
The security of the organization is one of the main and fundamental responsibilities
for all the organization. It can be stated that there will be a huge chance for the safety and the
defence which is needed to be controlled to make the system better. That is why access
control is needed to protect the system properly to get the task done. There is a various
procedure which should be used to modify the access control properly to get the solution
done (Prakash and Sivakumar, 2014).
Network environment and possibilities
The security can be hugely controlled through the process of the task in such a way,
that the task should be maintained adequately to get the cases to control properly. The
authentic user and the customers should get the chance to insert into the process then it can be
stated that the complex control should be easily done through the procedure of the task
completion. The sensitivity level should be properly maintained to complete the protection
procedure (Abu Naser, Al Shobaki and Ammar,2017). The access control is the main process
which should contain reliable support separation with the security complexity to complete the
procedure properly. Main four process needed to add in the company to make the system
better:
RBAC or the Role-based access control: The access policy should be maintained in such a
way that the MAC address clearance will be done properly. It will be denoted as per the role
of the subject. The function and permission will be done properly to make the system better.
The subject-level should be properly specified to make the situation better for every task. So
the object level should be managed properly to get the task done with the process of the task
completion.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information System Control and Auditing | Policies
|4
|557
|15

Cybersecurity | Information System Control and Auditing
|7
|1217
|15

Information System Control and Auditing | Report
|5
|712
|21

Information System Control and Auditing | Case Study Report
|9
|1574
|16

Database Security
|4
|831
|331

Risks and Preventive Measures in Cloud Computing and Microservices Strategy
|7
|1822
|465