Answered You can hire a professional tutor to get the answer.

QUESTION

WEEK 5 ESSAY QUESTIONSInstructions: Answer all questions in a single document.

WEEK 5 ESSAY QUESTIONSInstructions: Answer all questions in a single document. Then submit to theappropriate assignment folder. Each response to a single essay question shouldbe about a half-page in length (about 150 words).

1. Access controls are security features that are usually considered the firstline of defense in asset protection. They are used to dictate how subjectsaccess objects, and their main goal is to protect the objects fromunauthorized access. Access control models are frameworks that use accesscontrols to enforce the rules and objectives of the model. In your essay response, compare the different Access Control Models and give anexample of one that you have used in a work situation or if that is not possible, one that you’ve read about in a scholarly article.

2. Relying on a password to secure access to a system does not provideenough security in today’s complex world. The Office of PersonnelManagement learned this the hard way in 2015. Since OPM was hackedand it was learned that the attackers compromised their systemadministrator accounts that were protected only with passwords, theFederal government has required the use of multifactor authentication forprivileged accounts. Describe the three factors that can be used inauthentication and give at least two examples for each.

3. There are two main methods of access control administration that anorganization can choose between to achieve the level of protection thatthey need to secure their assets and information: centralized anddecentralized. Describe the RADIUS, TACACS, and DIAMETER forms ofcentralized access control administration. What are the advantages anddisadvantages of decentralized administration

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question