Access Points Essay

Total Length: 927 words ( 3 double-spaced pages)

Total Sources: 2

Page 1 of 3

Retinal scans are particularly profound as it is unique to the individual. From a security standpoint, this access control method has the most potential as it is difficult to replicate a finger print, or retinal scan.

4) The forth factor is someone you know. In this access control concept, another person who knows the individual in question can provide a human element of authentication in situations where systems have been set up to allow for such scenarios. For example, a user may have their password, but have forgotten their smart card. In such a scenario, if the user is known to designated cohorts, the cohorts may provide their smart card and password, in combination with the extant factor of the user in question, and thus provide two factors for the user with the missing credential, giving three factors overall to allow access (Rhee, 2003)

In addition to the factors mentioned above, access can be granted based on specific metrics or criteria. These criteria are particularly useful online, as it allows individuals to limit their overall exposure to a data breach. There are four main methods in which to do so (Gralla, 2007).

1. Mandatory Access Control (MAC)

In MAC, users do not have much freedom to determine who has access to their files. Instead certain categories of clearance of given to certain individuals based on factors such as trust, tenure and knowledge.
For example, security clearance for those individuals in the military. In these situations, depending on the level of clearance, certain information can be accessed.

2. Discretionary Access Control (DAC)

In DAC, the data owner determines who can access specific resources. For example, a system administrator may create a hierarchy of files to be accessed based on certain permissions. This system is used primarily in companies that rely heavily on human capital. Google may only want to allow access to its search engine algorithm to certain individuals within the company.

3. Role-Based Access Control (RBAC)

RBAC allows access based on the job title. For example, a human resources specialist should not have permissions to create network accounts; this should be a role reserved for network administrators. This is often used throughout business to prevent fraud or criminal activity. By restricting access based on job title, certain individuals can only perform certain tasks. This helps to better pinpoint any discrepancies or questionable activity that may occur.

4. Rule-Based Access Control this form of access control is based a certain criteria or constraint. An example of this would be only allowing students to use the labs during a certain time of the day. This access control limits the available time that a breach can potentially occur (Gralla, 2007).

Refernces:

1) Gralla, Preston (2007). How the Internet Works. Indianapolis: Que Pub......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


Related Essays

Analysis of Honolulu International Airport

200; Double Tandem -- 400; Dual Double -- 850 04L/22R 6952 x 150 Asphalt Good Single -- 100; Double -- 200; Double Tandem -- 400; Dual Double -- 850 08W/26W 5000 x 300 Water n/a n/a 04W/22W 3000 x 150 Water n/a n/a Chapter 3: Landside Landside consists of all land access points, focusing on the main terminals of the airport but also its massive parking infrastructure. HNL has several passenger access and drop-off points, including several parking structures including Interisland Parking Structure (Lot M), Overseas Parking Structure (Lot D), which "will fill up first," (Honolulu International Airport, 2016). There are a total of 6,000 spaces in Overseas, Interisland, Commuter, and International parking structures (Honolulu International Airport,… Continue Reading...

Securing a School Compound

directions outside the compound, which is surrounded by a fence all the way around. The main access points are on the north face of the school and the guard booths should be installed at each one with mounted cameras inside and outside the perimeter. A third booth should be installed on the roof of the complex allowing for a 360-degree surveillance of the perimeter and beyond. This guard booth would be armed in case of a terrorist breach of the perimeter. A turret on both west and east wings would be installed for defensive purposes and a turret on the north face and the south face… Continue Reading...

Fast Food Restaurant Security

As with many consumer-oriented businesses, fast food restaurants need to maintain a strong but unobtrusive security profile. Their structures and access points need to remain accessible while still preventing malicious behavior. This security survey of a fast food restaurant provides an example of how to perform a total security audit, identify weaknesses and risks particularly with regards to customer and employee safety, and offer suggestions for improvement. Property and Perimeter The outermost boundaries of the fast food restaurant are the limits of the company’s locus of control. There is a lot the fast food restaurant can do to improve its perimeter security, without deterring customers. In fact, making upgrades to… Continue Reading...

Hypercapitalism and the Yellow Vests

access points. Everything was up for grabs—the Middle East, Southeast Asia, South and Central America, Eastern Europe—for capitalists societies entering into the era of globalization and, by extension, an era of hypercapitalism, the need to control was imminent. The need to control, however, did not coincide with the need to support populations—either abroad or domestic. The aim of globalization as with hypercapitalism was to gain hegemonic control and to provide the means of wealth transfer: the inner circle of the developed world stood to benefit and has done so, with… Continue Reading...

Public Transportation and Promotion

a city to promote public transportation is to keep prices low, make access points as convenient as possible, and keep the public transport system safe and clean so that it appeals to all people no matter their demographic. Significance of the Problem The problem is significant because of the negative outcomes that can be avoided were public transportation to be utilized more thoroughly by the populace of a city. To preserve the health of the atmosphere by cutting down on smog, people should use public transportation as it is essentially like an enormous car pool operation that allows individuals to get where… Continue Reading...

Identifying Opportunities to Improve Revenues and Ridership Levels at WMATA

"Metro is working with employees, riders, jurisdictional partners, and the general public to make sure that everyone does their part in creating and sustaining a culture of safety and security in stations, vehicles, support facilities, and access points" (Metro facts, 2016 p. 2). Some of the initiatives that have already been taken to promote safety throughout the Metro network include the following: • Digital signs in the stations show next train arrival times, system status and time of day; • Digital signs outside some stations show system status and time of day; • Digital LCD monitors at station manager kiosks show real-time advisories and alerts; • Two-way radios between train operator and operations control center; • Hotlines from operations control center to police and fire departments;… Continue Reading...

sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Access Points" (2014, April 19) Retrieved May 22, 2025, from
https://www.aceyourpaper.com/essays/access-points-188299

Latest MLA Format (8th edition)

Copy Reference
"Access Points" 19 April 2014. Web.22 May. 2025. <
https://www.aceyourpaper.com/essays/access-points-188299>

Latest Chicago Format (16th edition)

Copy Reference
"Access Points", 19 April 2014, Accessed.22 May. 2025,
https://www.aceyourpaper.com/essays/access-points-188299