It 244 Appendix F
Appendix F
Access Control Policy
Student Name: Katelyn Sims
Axia College
IT/244 Intro to IT Security
Instructor’s Name: Jennifer McLaughlin
Date: 11/22/2011
Access Control Policy
Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems
1 Authentication
Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.
Authentication of an individual to access and use files, systems, and screens is vital to …show more content…
Role based access control is when the user is set certain roles that give them access to specific systems and data. They are only granted access to information that is defined in their set role. If their daily job changes, extra roles that define what they need to access will be granted. There are three rules that need to be followed when handling role based access. First is the user can only give permission to others if they have that ability defined in their set role. Second is that users are only allowed to do additional roles in areas that they are authorized. The third rule is that a user can only give permission if it is authorized within their role.
3 Remote access
Describe the policies for remote user access and authentication via dial-in user services and Virtual Private Networks (VPN)
Remote access is a user accessing their work system and data using the company’s network at a remote location that is anywhere besides at work. It is essential to monitor who is given this type of access and what they are allowed to access when they are not using the company’s devices. A VPN (virtual private network) lets the user access these resources to the network through a protected tunnel on a public network, such as the internet, from a remote location. Remote access dial in user service (RADIUS) is used to connect users to the network via a modem. It authenticates the user so their