Discussion: Multilayer User Access Control Learning Objectives and Outcomes Identify what implementation method(s) can be used to incorporate multilayer access controlDescribe and how each method be
| Multilayer User Access Control |
Implementing multiple layers in security is providing a defense-in-depth mechanism and therefore stronger protection for the network and users. Multiple layers provide multiple road blocks for a user and attacker. Having multiple controls in place before something can be accessed may be tiresome for a user; however, the goal is to have the same effect on an attacker. If an attacker is able to find a hole and access a company’s network, additional layers of security might stop the attacker from reaching other systems, applications, or sensitive data.
In this exercise, you will learn about creating layers within the network.
Complete the table:
Access Control Method | Implementation Method(s) | How It Benefits Multilayered |
User Access Control Profiles | ||
Systems Access | ||
Applications Access | ||
File and Folder Access | ||
Data Access |
© 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.
www.jblearning.com Page 1