AuthorizationandAccessControloutline.edited13 x
Running Head: AUTHORIZATION AND ACCESS CONTROL OUTLINE 1
AUTHORIZATION AND ACCESS CONTROL OUTLINE 5
Authorization and Access Control Outline.
Students Name:
Professors Name:
Date.
Paper outline
Topic: Authorization and Access Control
1. Introduction
· Definition of Authorization
· Definition of Access Control
2. Have a Look at the Various Forms of Authorization and Access Control Techniques which include;
· Discretionary Access Control (DAC)
· Mandatory Access Control (MAC)
· Role Based Access Control (RBAC)
3. Will examine the various forms oof Access Control categories which include;
· Physical Control
· Administrative Control
· Technical or logistical Control
4. Access Control Types
There are a number of Access control types in our organizations which include;
· Preventive: Avoiding occurrence of undesirable events
· Detective: Making sure one identifies those undesirable events
· Corrective: Taking the necessary form of Measure against a given event that has occurred
· Deterrent: Discouraging any form of security violations from happening
· Recovery: Coming up with the right action and resources to restore operations
· Compensative: Provision of alternative solutions to other controls
5. Access Control Threats
· Denial of Services (DoS/DDoS
· Buffer Overflows
· Spoofing
· Malicious Software
· Emanations
· Shoulder Surfing
· Object Reuse
· Data Remanence
· Backdoor/ Trapdoor
6. Access Control Technologies
· Single Sign On
· Kerberos
· Sesame
· Security Domains
7. Access Control Challenges
8. Access control Principle
9. Conclusion.
Brief summary of the reference.
1. Shah, A. P. (2003). In his article explains how different access control techniques can be deployed to confer effective administrative control over a given system. He explains that RBAC systems are among the most beneficial software because they reduce the task of an administrator when users assume different roles with an organization since it can be configured with deferent access rights and privileges based on the new roles assumed.
2. Ferrari, E. (2010). In Ferrari’s, E. (2010) article, she highlights optimization of data security through the provisions best mechanism of ensuring big data protection. The article further affirms that unlike tradition system that uses several data protection frameworks, big section of big data management deploys the basic access control mechanism to securely protect the data’s integrity.
References
Ferrari, E. (2010). Access control in data management systems. Morgan & Claypool Publishers.
Fundamentals of information systems security/Access control systems. (n.d.). Retrieved from
https://en.wikibooks.org/wiki/Fundamentals_of_Information_Systems_Security/Access_Control_Systems
Petkovic, M., & Jonker, W. (2007). Security, privacy, and trust in modern data management. Springer Science & Business Media.
Shah, A. P. (2003). Scalable authorization in role-based access control using negative permissions and remote authorization. doi:10.21236/ada460113
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Achiever Papers is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Dissertation Writing Service Works
First, you will need to complete an order form. It's not difficult but, if anything is unclear, you may always chat with us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download