Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

After reading this week\'s materials, please respond to TWO (2) of the following

ID: 3814666 • Letter: A

Question

After reading this week's materials, please respond to TWO (2) of the following questions. PROVIDE CITATION IN APA

1. Describe the controls contained within the three Access Control categories that can be integrated within a defense-in-depth model and give an example of one that you have read about or have knowledge of from your own experience.

2. Describe three threats to Access Control from what were covered within the reading and give an example of each.

3. Describe three of the intrusion detection system types used in access control monitoring covered within the reading. What is a honeypot and what are the legal concerns with using them?

4. What are the challenges that an Identity and Access Management system helps overcome? What benefits does it provide?

5. Describe the process of Identification, Authentication, Authorization, and Accountability. What is a race condition?

6. Discuss the single sign-on technologies Kerberos, security domains, directory services and thin clients. What does federation provide?

Explanation / Answer

2. Three threats of access control are as follows:

Denial of service: Under this, computer resources are made unavailable for its user.

Buffer overflows: Under this, a program tries to write data which exceeds the size specified for it and hence uses other programs or buffer's memory space thereby crashing that program.

Password crackers: Under this a person or program shows itself as another person and takes control over these personal details like password and other security details.

3) Three intrution detation system (IDS) types are as below:

Host based IDS: It is installed in indivisula devices. It monitors incomming and outgoing packets. It is better then network based IDS in deteacting malicious activities.

Network based IDS: it monitors network traffic from a dedicated point in network analysing all passing network packets.

Stack based IDS: It isa TCP/IP based approach. It monitors network packets and remove it before it reaches OS level.