Access Control Types of Access Term Paper

Total Length: 1816 words ( 6 double-spaced pages)

Total Sources: 10

Page 1 of 6

These certificates are issued by the certification authorities (CAs) and they contain the name, expiration dates as well as serial numbers of the certificates.

OS Hardening

Operating system hardening is the process of addressing the various security issues and vulnerabilities in a given operating system via the implementation of the latest Operating system patches, updates, hotfixes as well procedures and policies that are necessary for reducing the number of attacks as well as system downtime.

Application hardening

Application hardening is the process of addressing the various security issues and vulnerabilities in a given operating system via the implementation of the latest application patches, updates, hotfixes as well procedures and policies that are necessary for reducing the number of attacks as well as system downtime.

Transmission / Remote access protection protocols

The transmission protocols that are necessary for the information assurance include the used of https as well as FTP. Https involves the use of a secure hyper text transfer protocol which is backed by an SLL encryption while FTP involves the use of a file transfer protocol whioch may be secured with a username and password

Wireless security

Wireless security is ensured via the encryption of data using various systems such as WEP keys

Antivirus / Anti-spyware software

Antivirus / Anti-spyware involves the use of special programs for proactively and actively detecting and eliminating threats such as viruses and malwares.


E-mail security

E-mail security involves the use of secure transmission protocols, usernames and passwords as well as Antivirus / Anti-spyware that involves the use of special programs for proactively and actively detecting and eliminating threats such as viruses and malwares.

Conclusion

It is important that every organization adopts a secure framework that is scalable and assured to ensure that the basic tenets of information assurance are maintained at all times. Government's and corporations must….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Access Control Types Of Access" (2012, March 04) Retrieved May 20, 2024, from
https://www.aceyourpaper.com/essays/access-control-types-access-54738

Latest MLA Format (8th edition)

Copy Reference
"Access Control Types Of Access" 04 March 2012. Web.20 May. 2024. <
https://www.aceyourpaper.com/essays/access-control-types-access-54738>

Latest Chicago Format (16th edition)

Copy Reference
"Access Control Types Of Access", 04 March 2012, Accessed.20 May. 2024,
https://www.aceyourpaper.com/essays/access-control-types-access-54738