components of the AAA or Triple A process

User Generated

aningrwn

Computer Science

ISOL 531 access control

University of cumberlands

Description

Please use the Individual Project (IP) title page provided in the course material folder.

Your SA score should not be more than 30%. Indent all paragraphs must have at least four complete sentences and used sub-headers for each question. In-text citations and a reference list are also a requirement. You need to have at least 5 different cited sources. Please ensure that all cited sources are credible.

Unformatted Attachment Preview

ISOL634-25 Physical Security 1 Your Name University of the Cumberlands ISOL634-25 Physical Security Week 17 Individual Project Professor Richards Date ISOL634-25 Physical Security What is defensible space? According to Fennelly (2013), defensible space is a surrogate term for the range of mechanisms real and symbolic barriers, strongly defined areas of influence, improved opportunities for surveillance that combine to bring an environment under the control of its residents. To provide maximum security and control over an area, it should first be divided into smaller, clearly defined areas or zones, which describe the defensible space (Wayland, 2015). What is Crime Prevention through Environmental Design? Crime Prevention through Environmental Design (CPTED) is a multidisciplinary approach to the reduction of crime and the associated enhancement of the perception of personal safety by inhabitants of an environment (Tipton & Nozaki, 2007). White (2014) stated that CPTED is a concept in the security industry, basically meaning that you may be able to reduce criminal acts from occurring with the proper design and planning of an environment. In theory, you can make changes to the physical environment that allow for better physical and operational controls of the property; as a result, it can further your crime prevention strategies. 2 ISOL634-25 Physical Security 3 References Fennelly, L. J. (2013). Effective physical security (Fourth edition. ed.). Amsterdam: ButterworthHeinemannis an imprint of Elsevier. Tipton, H. F., & Nozaki, M. K. (2007). Information security management handbook (6th ed.). Boca Raton: Auerbach Publications. Wayland, B. A. (2015). Emergency preparedness for business professionals : How to mitigate and respond to attacks against your organization (1st edition. ed.). Wlatham, MA: Elsevier. White, J. M. (2014). Security risk assessment : Managing physical and operational security. Amsterdam ; Boston: Butterworth-Heinemann is an imprint of Elsevier. Upload Assignment: Week 1 Individual Project ASSIGNMENT INFORMATION Points Possible Due Date Sunday, January 13, 2019 11:59 PM 20 There are three types of subjects when it comes to access control for a specific resource. Using APA format write 3-6 pages explaining these types of subjects along with the components of the 'AAA' or "Triple A" process. Requirements Please use the Individual Project (IP) title page provided in the course material folder. Your SA score should not be more than 30%. Indent all paragraphs must have at least four complete sentences and used sub-headers for each question. In-text citations and a reference list are also a requirement. You need to have at least 5 different cited sources. Please ensure that all cited sources are credible By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution's policies, and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Outline
Introduction
Body
Conclusion
Reference


ACCESS CONTROL

1

Your Name
University of the Cumberlands
ISOL634-25 Physical Security
Week 17 Individual Project
Professor Richards
Date

ACCESS CONTROL

2

ACCESS CONTROL
Access control is the process of limiting access to a system, physical or virtual resources.
Access control can also be explained as a process where users are granted access into the system
and are given specific privileges and rights to the resources. Access control is important in
organizations and home resources because it helps prevent unauthorized entry into the computer
system, physical resources as well as the internet (Jayant.D, Swapnaja A, Sulabha S, & Dattatray
G, 2014). Access control provides responsibilities to the users since access to resources both
physically and through the internet requires credentials and identification of the users. The main
goal of access control is to minimize the risk caused by unauthorized access. This paper talks
about the types of subjects of access control as well as the components of the AAA process in
information security.
Types of Access Control
Discretionary access control
Discretionary Access Control (DAC) is a type of access control where business owners
have the responsibility of deciding who can be granted access to specific resources and locations
either physical...


Anonymous
I was stuck on this subject and a friend recommended Studypool. I'm so glad I checked it out!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags