I need a discussion post in APA format

User Generated

Qrrcnx1992

Computer Science

ISOL 531 access control

UOL

Description

Discussion: Multilayer User Access Control

Learning Objectives and Outcomes

  • Identify what implementation method(s) can be used to incorporate multilayer access control
  • Describe and how each method benefits multilayered access control.

Assignment Requirements

Read the worksheet named “Multilayer User Access Control” and address the following:

Using what you have learned about building a multilayer access control system, identify what implementation method(s) can be used and how each method benefits multilayered access control.


Required Resources

  • Worksheet: Multilayer User Access Control (ws_multilayeraccesscontrol)

Self-Assessment Checklist

Use the following checklist to support your work on the assignment:

  • I have engaged in discussion of the assigned topics with at least two of my peers.
  • I have raised questions and solicited peer and instructor input on the topics discussed.
  • I have articulated my position clearly and logically.
  • I have supported my argument with data and factual information.
  • I have provided relevant citations and references to support my position on the issue discussed.
  • I have compared and contrasted my position with the perspectives offered by my peers and highlighted critical similarities and differences.
  • I have solicited peer and instructor feedback on my arguments and propositions.
  • I have offered a substantive, critical evaluation of my peer’s perspective on the issues that is opposite of mine and supported my critical review with data and information.
  • I have followed the submission requirements.

Unformatted Attachment Preview

Multilayer User Access Control Implementing multiple layers in security is providing a defense-in-depth mechanism and therefore stronger protection for the network and users. Multiple layers provide multiple road blocks for a user and attacker. Having multiple controls in place before something can be accessed may be tiresome for a user; however, the goal is to have the same effect on an attacker. If an attacker is able to find a hole and access a company’s network, additional layers of security might stop the attacker from reaching other systems, applications, or sensitive data. In this exercise, you will learn about creating layers within the network. Complete the table: Access Control Method Implementation Method(s) How It Benefits Multilayered Access Control User Access Control Profiles Systems Access Applications Access File and Folder Access Data Access © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Page 1
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: MULTILAYER USER ACCESS CONTROL

Multilayer User Access Control
Institutional Affiliation
Date

1

2

MULTILAYER USER ACCESS CONTROL

Multilayer User Access Control
User access control profile is implemented by the use of role-based access control. It allows
users of a group to have access and everyone has equal rights. The role can have some of the access
controls removed o...


Anonymous
Really helpful material, saved me a great deal of time.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags