Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Access controls are security features that are usually considered the first line

ID: 3557854 • Letter: A

Question

  1. Access controls are security features that are usually considered the first line of defense in asset protection. They are used to dictate how subjects access objects, and their main goal is to protect the objects from unauthorized access. These controls can be administrative, physical, or technical in nature and should be applied in a layered approach, ensuring that an intruder would have to compromise more than one countermeasure to access critical assets. Explain each of these controls of administrative, physical and technical with examples of real-world applications.
  1. Access control defines how users should be identified, authenticated, and authorized. These issues are carried out differently in different access control models and technologies, and it is up to the organization to determine which best fits its business and security needs. Explain each of these access controls models with examples of real world applications.
  1. The architecture of a computer system is very important and comprises many topics. The system has to ensure that memory is properly segregated and protected, ensure that only authorized subjects access objects, ensure that untrusted processes cannot perform activities that would put other processes at risk, control the flow of information, and define a domain of resources for each subject. It also must ensure that if the computer experiences any type of disruption, it will not result in an insecure state. Many of these issues are dealt with in the systems security policy, and the security model is built to support the requirements of this policy. Given these definitions, provided an example where you could better design computer architecture to secure the computer system with real-world applications. You may use fictitious examples to support your argument.

Explanation / Answer

Access control mechanism is implemented at various layers in order to protect the data or secret information from unauthorized access.

Access control methods:

Real world example of an organization which uses above mentioned Access control methods is NASA.

Access control Models:

There are seven different access control models are given below:

The architecture of computer system is important and the key aspects of a system are given below:

Some of the computer architecture security models are state machine model, Bell-LaPadual model, lattice-Based access controls, and integrity models.

Refer to figure 6.14 and 6.15 of the text book for the design model examples.